You are on page 1of 311

MOST POPULAR AROUND THE WORLD

SUCCESS

PRACTICE BOOK» NOT FOR SALE


SERIES

OPERATING SYSTEMS
BOOST YOUR KNOWLEDGE

DESIGNED FOR SURE SUCCESS


MCQ EDITION
NARAYAN CHANGDER

4 + S
5 O N
S
29 STI ER
E W
QU NS
A
USEFUL FOR
4STUDENTS 4
□ □TEACHERS 4
□PARENTS 4□KIDS 4
□QUIZ TEST
□EXAM 4
4 □TRIVIA TEST 4
□COMPETITIVE EXAM 4
□OTHERS
2

Preface:
This book has undergone rigorous scrutiny to ensure its accuracy. I eagerly invite constructive
feedback on its content. Feel free to reach out to me via Facebook at https://www.facebook.
com/narayanchangder. Additionally, you can access all of my books on Google Play Books at
https://play.google.com/store/books/author?id=Narayan+Changder.

JAI SHREE RAM

NARAYAN CHANGDER
This E-book is dedicated to the loving memory of my mother:

PRACTICE BOOK» NOT FOR SALE


my guiding light, my shining star,
forever

It is my deepest gratitude and warmest


affection that I dedicate this Ebook.

To my mother JOYTSNA CHANGDER


who could not see this Ebook.

who has been a constant source of Knowledge and in-


spiration. Mom, Covid did not take you, it took our
many dreams. wherever you are we will meet again.
Disclaimer

The aim of this publication is to sup-


ply information taken from sources be-
lieved to be valid, reliable and authen-
ticate. The author bear no responsibil-
ity for any damage arising from inad-
verent omissions, negligence or inac-
curacies (typographical or factual) that

NARAYAN CHANGDER
may have found their way into this PDF
booklet.
Due care has been taken to ensure that
the information provided in this book
is correct. Author is not responsible
for any errors, omissions or damage
arising out of use of this information.

nt
Importa inter-
s , s e ar ch the de
er to inclu -
i t h t h e answ w a n t
w u au
atisfied . If yo ontact
If not s rrect answers klet, please c t s:
p
net for
co
i n t h is boo F a c e b ook ht
estions on
tact him arayanchangd
er/
new qu a n c o n n
ou c om/
thor. Y acebook.c
. f
//www
CRUCIAL INFORMATION: PLEASE READ BEFORE
CONTINUING:

PRACTICE BOOK» NOT FOR SALE


1. If you require practice sets on various sub-
jects, kindly send us a message on Facebook
with the subject name. Our team will be happy
to create them for you. Message us on Face-
book at https://www.facebook.com/
narayanchangder
2. Additionally, you can access all of my books
with answers on Google Play Books at »>
https://play.google.com/store/books/
author?id=Narayan+Changder
3. Answers are given at the end of every page
to help you identify your strengths and weak-
nesses.
4. It shows you how to build your own techni-
cal and pedagogical skills to enable them to
create their own materials and activities for
students.
5. It helps you to see how you can make the
transition from classroom teaching to blended
and online teaching.
6. It’s the cheapest good quality ebook that you
can buy online on google play books.

NARAYAN CHANGDER
7. The money raised from creating the sales of
the book will help to ensure that I’m able to
produce similar books like this at a compara-
ble price.
8. YOU CAN DOWNLOAD 4000+ FREE PRACTICE
SET PDF EBOOK ON VARIOUS SUBJECTS (NURS-
ERY to UNIVERSITY LEVEL) FROM GOOGLE
DRIVE LINK https://drive.google.com/
drive/u/1/folders/19TbUXltOSN5S7FV3sL
PRACTICE BOOK» NOT FOR SALE
Contents

1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1 What Operating Systems Do . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Computer-System Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.3 Computer-System Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
1.4 Operating-System Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64

2 Operating-System Structures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
2.1 User and Operating-System Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
2.2 System Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
2.3 Boot Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
2.4 Windows Boot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143

3 Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
3.1 Process Concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
3.2 Process Scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
3.3 Interprocess Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
3.4 Client Server Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167

4 Threads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
4.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
4.2 Multicore Programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
4.3 high performance computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
4.4 Thread Libraries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
1

5 Process Synchronization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210


5.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210

PRACTICE BOOK» NOT FOR SALE


5.2 The Critical-Section Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216

6 CPU Scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217


6.1 Basic Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
6.2 Scheduling Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219

7 Deadlocks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
7.1 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
7.2 Deadlock Prevention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
7.3 Deadlock Avoidance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
7.4 Deadlock Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233

8 Main Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234


8.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
8.2 Contiguous Memory Allocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
8.3 Segmentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
8.4 Paging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242

9 Virtual Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247


9.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
9.2 Page Replacement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252

10 Mass-Storage Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256


10.1 Overview of Mass-Storage Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
10.2 Disk Scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
10.3 Disk Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
10.4 RAID Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262

11 File-System Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264


11.1 File Concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
11.2 Directory and Disk Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
11.3 File systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268

12 Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
12.1 PROTECTION AND SECURITY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
1. Introduction

NARAYAN CHANGDER
1.1 What Operating Systems Do
1. You just deleted a shortcut to an important 4. How does the OS handle file manage-
work presentation. What happened to the ment?
data in the presentation? A. Deals with movement, editing and
A. Nothing deletion of data
B. It’s in the Recycle Bin/Trash B. Colour codes data
C. It’s deleted C. Translates data into binary
D. It’s in the recovery partition D. none of above
2. A performance monitor is a program that
5. What is the kernel of the operating sys-
assesses and reports information about
tem?
various computer resources and devices
A. Managing memory A. The parts of the OS that interact with
peripherals
B. Monitoring performance
B. Central components of the operating
C. Managing programs system
D. Providing file, disk and system man-
C. The part of the OS that are not loaded
agement tools
into memory
3. What is OS Virtualization? D. The start-up instructions for the com-
A. The use of multiple hard disk to create puter
one logical disk.
6. What do operating systems provide?
B. The use of a software to run multiple
OS on the same hardware. A. A backspace button that you can press.
C. The use of software and hardware to B. Communication from you to the com-
emulate a Network. puter.
D. The use of hard disk to expand the total C. A server that makes the keyboard
memory available to the OS. work.

1. A 2. B 3. B 4. A 5. B 6. B
1.1 What Operating Systems Do 3

D. Communication between your touch- 12. The user interacts with the computer by
screen and the speakers. clicking on the icon to open the program.
State the functions.

PRACTICE BOOK» NOT FOR SALE


7. Software is a series of that tells a com-
A. Managing programs
puter what tasks to perform and how to
perform them. B. Managing Memory
A. data C. Provide user interface
B. information D. Graphical user interface (GUI)

C. instruction 13. How does the OS provide security


D. utility A. Using passwords or backing up files
B. keeping a check on other processes
8. Which of the following software manages
the files and folders on your computer’s C. making thecommunication possible be-
hard disk drive? tween the input and output devices and
the computer
A. Word processing software
D. Allocatingareas of memory to different
B. Anti-virus software programs so that each program can run
C. Operating System effectively
D. Database software 14. Most people have this Operating System
on their Computer System.
9. Which type of OS guarantees a response
A. UNIX
within a specified timescale?
B. LINUX
A. Multi-tasking
C. IOS
B. Multi User
D. Microsoft Windows
C. Distributed
D. Real-time 15. The ability of a computer to execute a pro-
gram on two or more processors simulta-
10. Which of the following is not an example neously is
of an OS for Smart phone? A. Multiprogramming
A. UNIX B. Multitasking
B. IOS C. Multiprocessing
C. Windows Phone 7 D. none of above
D. Android 16. The following is not a function of an oper-
ating system:
11. What is not one of the basic functions of
an operating system? A. Checking for viruses
B. Directing information from peripheral
A. Manage applications
devices like a mouse or a printer
B. Tracking the date and time
C. Allowing users to open applications
C. Provide a user interface
D. Allocating the computer’s memory be-
D. Control hardware access tween different tasks.

7. C 8. C 9. D 10. A 11. B 12. C 13. A 14. D 15. C 16. A 17. C


1.1 What Operating Systems Do 4

17. The ability for different people to use the 23. The operating system is a type of
same computer is made possible through: A. system software
A. Open-source software B. general purpose software
B. Desktop elements C. utility software
C. User accounts D. application software
D. Settings app
24. What are the 3 main operating systems?
18. CPU stands for:

NARAYAN CHANGDER
A. MAC OS
A. Central Processing Unit B. Linux
B. Computer Processing Unit
C. Windows
C. Central Processer User
D. Firefox
D. none of above
25. The purpose of the GUI is to
19. First come, firstF served is an example of
A. hide the complexities of the machine
A. Memory Management from the user
B. Interrupts B. Guide the user
C. Processor Scheduling C. to make the screen look nice
D. I/O Management D. none of above
20. Peter, a friend of yours, has a piece of 26. Which type of OS can run many jobs simul-
software that was written for Mac OS X. taneously
Which of the following OSs will that soft-
A. Multi-tasking
ware run on?
B. Multi User
A. Mac OS X only
C. Distributed
B. Mac OS X and Linux
D. Real-time
C. Mac OS X and Chrome OS
D. Mac OS X, Linux, and Chrome OS 27. What is an operating System
A. A piece of hardware
21. Function of Operating System except
A. Start & shut down a computer B. A set of programs to create documents

B. Provide a user C. A set of programs that manages the


operations of the computer for the user
C. Managing programs
D. The boot up program
D. Managing memory
E. Monitoring performance 28. You are going to purchase a new iPhone.
Which operating system will be instead on
22. The following is not a part of GUI: it?
A. command prompt A. iOS
B. scroll bar B. OS X
C. text box C. iPhone OS
D. radio button D. ion know

18. A 19. C 20. A 21. B 22. A 23. A 24. A 24. B 24. C 25. A 26. A 27. C 28. A
29. B
1.1 What Operating Systems Do 5

29. Keeping track of time & resource used by A. shut down


various job and users. B. hibernate

PRACTICE BOOK» NOT FOR SALE


A. Security C. sleep
B. Job accounting
D. none of above
C. I/O System Management
35. Which of these tasks is a function of the
D. Command interpretation
operating system?
30. What is an operating system? A. Scanning a photograph
A. Software that is written to work in the B. Copying a file
background to create the working environ-
C. Producing a database report
ment for the computer.
B. A system that makes the computer D. Adding data to a spreadsheet
run. 36. A service not provided by OS is
C. Software that makes the computer A. user interface
turn on
B. networking
D. A system software that helps google
slides turn in. C. program execution
D. error detection
31. What is the main advantage of a GUI?
A. Reduces the cost of computing 37. Fred, a co-worker, heard about new soft-
ware called Lollipop. Which operating sys-
B. Makes the computer easier to use
tem is the referring to?
C. Required a less powerful computer
A. iOS
D. Does not need updating
B. OS X
32. Icons, menus and windows are part of: C. Android
A. Graphical user interface D. Chrome OS
B. System security
38. Which of the following operating systems
C. Applications and user files can you freely modify if you choose?
D. Graphics or games packages A. OS X
33. This module is interpreting commands B. iOS
given by the and acting system resources
C. BlackBerry
to process that commands.
D. Linux
A. I/O System Management
B. Command interpretation 39. The instructions that tell the computer
what to do:
C. Device Management
A. Hardware
D. Security
B. Input
34. Which of the following shut down options
saves its current state to the hard disk be- C. Software
fore removing power from computer D. Ooutput

30. A 31. B 32. A 33. B 34. B 35. B 36. B 37. C 38. D 39. C 40. A
1.1 What Operating Systems Do 6

40. Function of system software is to serve as 45. which one is not the example of linux OS
the between the user, the application A. FEDORA
software, and the computer’s hardware
B. REDHAT
A. interface
C. UBUNTU
B. program
D. MACOSX
C. application
46. Windows 7 and Windows Vista are exam-
D. server ples of:

NARAYAN CHANGDER
41. A role of the operating system that helps A. IOS Phone
keep storage devices well organized and B. Android
maintained. C. Microsoft Windows
A. Application Management D. none of above
B. Disk Management
47. How big is a page?
C. Service Management A. 1Kb
D. Device Management B. 4Kb
42. What does an operating system do? C. 16Kb

A. Manage the operations of the com- D. 64Kb


puter 48. Program Execution services are used to
B. Act as a bridge between the user and A. control program
hardware
B. delete program
C. Provide a framework for software to C. execute program
run
D. update program
D. All of these
49. Select Multple:What are some advantages
43. Which of these is not a desktop operating of a VM?
system? A. Allowing the ability to run multiple OS
A. Windows B. Ease of maintenance
B. iOS C. Convenient recovery with snapshot
C. MacOS D. Independence from Hardware
D. Ubuntu 50. What is the purpose of virtual memory?
44. The function of OS to keep track of time & A. To store the OS used by a Virtual Ma-
resource used by various job and users is chine
done by B. To store data that doesn’t need to be
A. Networking kept long term
C. To store program instructions as they
B. Job accounting
are executed
C. Security
D. To store data not currently in use to
D. None free up RAM

41. B 42. D 43. B 44. B 45. D 46. C 47. B 48. C 49. A 49. B 49. C 49. D
50. D 51. C
1.1 What Operating Systems Do 7

51. ensures that all access to system re- 56. The function of OS to manage and organize
sources is controlled. I/O operations and all I/O devices is done
by

PRACTICE BOOK» NOT FOR SALE


A. Error Detection
A. I/O System Management
B. Accounting
B. Secondary-Storage Management
C. Protection
C. Device Management
D. Security
D. Memory management
52. A translates high-level language state-
57. Bytecode is an example of
ments into machine code.
A. Machine code
A. Programmer
B. Assembly language
B. Syntax Detector
C. Source code
C. Compiler
D. Intermediate code
D. Decipherer
58. This is scheduling policy that selects for ex-
53. Managing computer memory by the oper- ecution the waiting process with the small-
ating system does not include this process: est execution time.
A. connecting printers and other periph- A. First-come, first-serve
eral devices B. Shortest-job first scheduling
B. releasing memory not used for a while C. Round-robin scheduling
C. loading programs into memory as a D. Priority scheduling
user opens them
E. Multilevel queue scheduling
D. protecting one program’s memory
area from being used by the other pro- 59. A server operating system organizes and
gram coordinates how multiple users access and
share resources on a network
54. What does ISR stand for? A. Establish an Internet connection
A. Interrupt Service Routine B. Controlling a network
B. Internal System Routing C. Managing programs
C. Interrupt Service Regulation D. Provide a user interface
D. Interrupt System Routing 60. Which of the following is a function of the
operating system?
55. What is Disk Thrashing?
A. To compose and send email.
A. Over-filling the hard drive
B. To edit photographs and other high-
B. Running a program with lots of inputs resolution images.
and outputs.
C. To control communication and manage
C. Constant swapping of data between files.
RAM and virtual memory
D. All of these are operating system func-
D. Storing a file in excess of 4Gb in size tions.

52. C 53. A 54. A 55. C 56. A 57. D 58. B 59. B 60. C 61. A
1.1 What Operating Systems Do 8

61. A role of the operating system that man- A. Paging splits the process to be loaded
ages applications or programs that are in- into equal size blocks
stalled on a system. B. Paging splits the process to be loaded
A. Application/Program Management into variable sized, logical blocks
B. Service Management C. Paging allocates frames to hold the
C. Access Control/Protection data on the hard drive

D. Windows Settings App D. Paging is used on Windows computers,

NARAYAN CHANGDER
segmentation on MacOS
62. One of the capabilities of operating sys-
tems:The computer is capable of operating 67. How can the OS help manage security of
multiple applications at the same time. the system?

A. multi-user A. The OS can hire backup

B. multitasking B. User accounts may be password pro-


tected
C. multiprocessing
C. Files can self destruct after a set time
D. multi-threading

63. Operating systems often provide users D. none of above


with the capability of
68. Operating systems are responsible for log-
A. Cleaning up disk ging users in and out. This function is a
B. Defragmenting disk part of:
C. Backing up files and disk A. user interface
D. All answer B. memory management
C. managing hardware and devices
64. programs that control or maintain the
operations of the computer and its devices. D. none of above
A. Software 69. Which if the following is not a function of
B. System Software an operating system?
C. Application software A. interface between the user and the ma-
chine
D. Utility program
B. coordinate software applications
65. An OS manages multiple programs and pro-
C. coordinate hardware components
cesses while you use the computer
D. monitor system health
A. Providing file, disk and system man-
agement tools 70. The operating system provides an inter-
B. Monitoring performance face between (choose two)
C. Managing programs A. users and hardware
D. Establish an Internet connection B. application and hardware

66. What is the difference between paging and C. motherboard an applications


segmentation in memory management? D. windows and macOS

62. B 63. D 64. B 65. C 66. A 67. B 68. A 69. B 70. A 70. B 71. D
1.1 What Operating Systems Do 9

71. Memory management optimizes the use of B. Multi-User


RAM C. Distributed

PRACTICE BOOK» NOT FOR SALE


A. Monitoring performance D. Real-time
B. Managing programs
77. Keeping track of the location of processes
C. Managing storage in memory and allocating space to new pro-
D. Managing memory cesses is known as
72. Select 2 disadvantages of a Graphical user A. Memory Management
interface(GUI) B. Process Management
A. It is slower than command-driven in- C. Memory Scheduling
terface
D. Process Scheduling
B. You may have to click many icons to-
complete a task. 78. What is the reason computer memory
needs to be managed?
C. Users do not have to remember the
commands A. the amount of memory in a computer
is limited
D. It is made for novice user
B. to protect your data from hackers
73. Which of the followings is not GUI operat-
C. applications can’t be trusted to use
ing system?
memory properly
A. DOS
D. none of above
B. Windows
79. The term OS is short for?
C. iOS
A. Apple
D. Linux
B. Operating Software
74. Listening to music on the computer while
C. Operating System
browsing the internet at the same time is
D. Overload System
A. Multiprogramming
B. Multitasking 80. What is the purpose of the BIOS?
C. Multiprocessing A. To initialise and test system hardware
D. none of above B. To communicate with peripherals dur-
ing normal use
75. The process of starting or restarting a com-
puter is called booting. C. To give access to the basic functions of
the OS
A. Start & shut down a computer
D. To keep RAM clear of I/O instructions
B. Provide a user interface
C. Managing programs 81. In this scheduling algorithm, the process
that comes first will be executed first and
D. Managing memory next process starts only after the previous
76. Which type of OS spreads processing gets fully executed.
across multiple computers/servers? A. First-come, first-serve
A. Multi-tasking B. Shortest-job-first scheduling

72. A 72. B 73. A 74. B 75. A 76. C 77. A 78. A 79. C 80. A 81. A
1.2 Computer-System Organization 10

C. Round-robin scheduling 85. Memory organization is the process of


D. Priority scheduling which of the following? (choose all that
apply)
E. Multilevel Queue scheduling
A. periodically saving documents
82. Which of the following mobile operating
B. assigning memory resources to opti-
systems has the largest install base in the
mize system preformance
world?
A. Android C. backup up the hard drive

NARAYAN CHANGDER
B. Blackberry 10 D. controlling and coordinating computer
memory
C. Windows 10 Mobile
D. iOs 86. One that is not a type of user interface of
the OS is
83. Two types of user interface
A. device interface
A. Graphical User Interface (GUI)
B. command line interface
B. Command-line Interface
C. graphical user interface
C. Both answer
D. batch interface
D. none of above
84. A user interface made up of a command 87. Environment for execution of programs is
prompt is called: provided by
A. Graphical User Interface A. inputs
B. Super User Interface B. operating systems
C. Command Line Interface C. outputs
D. Command User Interface D. memory

1.2 Computer-System Organization


1. For permanent memory in computer ob- D. Program Counter
jects used are-
3. The ALU makes use of to store the in-
A. Floppy Disc
termediate results.
B. magnetic Tape
A. Register
C. Hard Disc
B. Accumulator
D. Optical Disc
C. Stack
E. All of these
D. Heap
2. Which register is being described? Holds
the memory address about to be used by 4. Re-organises the files by putting the re-
the CPU lated files next to each other
A. MAR A. Encryption
B. MDR B. Compression
C. Accumulator C. Defragmentation

82. A 83. C 84. C 85. B 85. D 86. A 87. B 1. E 2. A 3. B 4. C


1.2 Computer-System Organization 11

D. Auto-Update 10. What is information

5. Division by zero causes an interrupt. A. collection of programs

PRACTICE BOOK» NOT FOR SALE


B. collection of instruction
A. implicit
C. collection of data
B. internal
D. collection of software
C. infinity
D. external 11. When we work on any document on PC, it
is stored temporarily on-
6. Which of the following statements about A. RAM
libraries is not true?
B. ROM
A. Code generated that includes libraries,
cannot be converted to stand alone code C. CPU
D. Flash Memory
B. An advantage of libraries is that they
consist of code that has already been 12. When an 8-bit ooperand is stored in the
checked and compiled register, it is stored in
C. Programmers can write their own li- A. Higher order bits of the Register
braries
B. lower order bits of the Register
D. Libraries could include functions for
C. Both A and B
generating random numbers or perform-
ing mathematical calculations D. None of the above

7. is generally used to increase the appar- 13. Starting from the source code, which of
ent size of physical memory. these will start running the program quick-
est?
A. Secondary memory
A. Interpreter
B. Virtual memory
B. Bytecode on a virtual machine
C. Hard Disks
C. Compiler
D. Disks
D. none of above
8. In addressing mode, the operand value
14. What type of memory is primarily used as
is directly specified.
cache memory?
A. Relative A. SRAM
B. Direct B. DRAM
C. Indexed C. RAM
D. Immediate D. ROM
9. A compiler converts 15. The fastest memory in the computer sys-
A. High level language to machine lan- tem is
guage A. ROM
B. source code to object code B. RAM
C. Both 1) and 2) C. Cache
D. none of above D. None of these

5. B 6. A 7. B 8. D 9. C 10. C 11. A 12. B 13. A 14. A 15. C 16. C


1.2 Computer-System Organization 12

16. Which of these is not a system utility pro- C. a bit, a nibble, a byte, a megabyte, a
gram? kilobyte, a gigabyte, a terabyte
A. Memory and CPU monitor D. a byte, a bit, a nibble, a megabyte, a
B. Defragmentation software kilobyte, a gigabyte, a terabyte

C. A graphics card driver 22. The situation wherein the data of


D. Diagnostic software in case of com- operands are not available is called
puter crash A. Data hazard

NARAYAN CHANGDER
17. enables the processor to access data B. Stock
quickly whenever they are needed. C. Deadlock
A. CU D. Structural hazard
B. Cache
23. is concerned with the way the h/w compo-
C. Memory nents operate and the way they are con-
D. Register nected together. (b) Co

18. Select the examples of Business Software A. Computer Architecture


A. Inventory Management System B. Computer Organization
B. Antivirus Software C. Computer Design
C. Payroll System D. None of the Above
D. Financial Accounting 24. Which of these is a not a computer manu-
facturer?
19. The type of control signal is generated
based on A. Microsoft
A. contents of the step counter B. Oracle
B. Contents of IR C. Apple
C. Contents of condition flags D. IBM
D. All of the mentioned
25. The highest measurement of data?
20. Which among is the largest memory unit A. Megabyte
A. Peta B. Gigabyte
B. Yotta C. Kilobyte
C. tera D. Petabyte
D. Exa
26. A sequence of control words corresponding
21. The following is a correct order of units of to a control sequence is called
storage from lowest to highest:
A. Micro routine
A. a bit, a nibble, a byte, a kilobyte, a
B. Micro function
megabyte, a gigabyte, a terabyte
B. a bit, a byte, a nibble, a kilobyte, a C. Micro procedure
megabyte, a gigabyte, a terabyte D. None of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer-System Organization 13

27. The instructions like MOV and ADD are 32. What is the purpose of Utility Software?
called as Click all that apply

PRACTICE BOOK» NOT FOR SALE


A. operands A. To keep the computer organised
B. opcode B. To ensure it has up to date software

C. commands C. To ensure the system runs efficiently


D. To translate machine code into high
D. Directives
level code
28. Computers use addressing mode tech- 33. Translates low level assembly language
niques for mnemonic into machine code
A. giving programming versatility to the A. Assembler
user by providing facilities as pointers to
B. Compiler
memory counters for loop control
C. Interpreter
B. to reduce no. of bits in the field of in-
struction D. none of above
C. specifying rules for modifying or inter- 34. Main memory works in conjunction with
preting address field of the instruction
D. All the above A. CPU
B. RAM
29. The register used to store the flags is
called as C. Graphics

A. Flag register D. None of these

B. Status register 35. Virtual memory is


C. Test register A. Memory on the hard disk that the CPU
uses an extended RAM
D. Log register
B. in RAM
30. A register that keeps track of the next in- C. only necessary if you do not have any
struction to be executed is called a RAM in your computer
A. Program Counter D. a backup device for floppy disk
B. Instruction Register 36. Which translator will create the fastest
C. Accumulator running program, provided all other things
are equal?
D. Data Register
A. Interpreter
31. An area on the CPU which speeds up pro- B. Bytecode on a virtual machine
cessing by storing copies of blocks of data
C. Compiler
A. Cheating D. none of above
B. ROM
37. is concerned with the structure and be-
C. Cache havior of the computer as seen by user
D. Memory Address Register A. (a)Computer Architecture

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer-System Organization 14

B. .(b) Computer Organization 42. Which is not an example of a structured


data base
C. (c) Computer Design
A. oracle
D. (d)NOne of the above
B. MS access
38. is frequently used to indicate digital C. Mongo DB
signals
D. Mysql
A. Light emiting diode
43. The informs the CPU about the location

NARAYAN CHANGDER
B. Tunnel diode of the data residing in the memory.
C. Pin diode A. Data bus
D. None B. Address bus
C. Cache
39. Why is it necessary for programs compiled
to bytecode (like Java) to use a virtual ma- D. Control line
chine? 44. The Register used to serve as PC is called
A. The programs are all the same, but A. Instruction Pointer
the machines they run on are different
B. Stack pointer
and the virtual machine acts as the inter-
preter. C. Accumulator

B. The virtual machine needs to be the D. Temporary Register


same on each machine in order to run the 45. which bus carries out signals to carry out
bytecode. operations for communication such as read
C. Compiling to bytecode means that it /write
will run more efficiently on each system. A. address
B. control
D. none of above C. data
40. The set of wires, which carry information D. none of above
in a controlled manner, is called 46. When there is more positive voltage (high
A. System bus (H)) then, it’s said to be
B. Public bus A. H = 1 = True

C. Private bus B. L = 0 = False


C. Both
D. None of these
D. None
41. The ALU works on the instructions and
47. To read the control words sequentially
data held in the
is used.
A. Notebook A. PC
B. Registers B. IR
C. Copy Pad C. UPC (MPC)
D. I/O devices D. None of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer-System Organization 15

48. In zero address instruction method, the 54. What part of the CPU is being de-
operands are stored in scribed.Carries out arithmetic operations
and performs logical comparisons.

PRACTICE BOOK» NOT FOR SALE


A. registers
B. accumulators A. ALU
C. push down stack B. Control Unit
D. cache C. Cache
49. What is VDU? D. none of above
A. Output device
55. Operating system can be matched
B. Input device with(more than one option is correct)
C. Storage device A. Component of computer system
D. None of the above
B. Interface between user and hardware
50. It is a computer program that combines C. Provide platform for other software to
various object files together in order to run
make an executable file.
D. Used to keep our system efficient and
A. Assembler
trouble free
B. Compiler
C. Linker 56. Program is translated line by line as the
program is running
D. Loader
A. Assembler
51. Which of these are Secondary Storage
B. Compiler
A. ROM
C. Interpreter
B. RAM
C. Hard Disk D. none of above

D. CPU 57. To get the physical address from the logi-


52. In Register Transfer Language, is used cal address generated by the CPU, is
to denote “Add the numbers in A and B used.
and place the sum in A”. A. MAR
A. B ← A + B B. MMU
B. A + B ← A C. TLB
C. A ← A + B
D. Overlays
D. A + B → B
58. The address of the address of the operand
53. MICR stands for
is specified in addressing mode.
A. Magnetic Interface Character Resolu-
A. immediate
tion
B. Magnetic Ink Card Reader B. direct
C. Magnetic Ink Character Reading C. indirect
D. Magnetic Ink Code Register D. relative

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer-System Organization 16

59. which is not a type of OS user interface 65. Breaking logical memory into blocks of the
A. command based same size is called as:
B. touch based A. Frames
C. graphical based B. Pages
D. machine learning C. Segments
60. N bits in operation code imply that there D. Blocks
are possible distinct

NARAYAN CHANGDER
A. 2n 66. is a large multilayered printed circuit
B. 2n board inside a computer that contains CPU,
BIOS, ROM chip and the CMOS setup infor-
C. n mation.
D. n/2
A. Motherboard
61. What does the hardwired control genera-
B. RAM
tor consist of?
A. Decoder/encoder C. ROM
B. Condition codes D. Cache
C. Control step counter
67. The operation stored on data stored in
D. All of the mentioned Register is called
62. Which of the following is NOT a transla- A. Micro operation
tor?
B. Bit Operation
A. Assembler
B. Compiler C. Byte Operation
C. Interpreter D. Macro operation
D. Executable
68. The PC register holds what?
63. Mark all the utility software
A. The data for the next instruction
A. compression software
B. The address for the next instruction
B. anti-virus software
C. operating system C. The accumulated memory location
D. disk cleaner D. The instruction for the next instruction
E. powerpoint
69. The controls the I/O devices and trans-
64. Translates source code from high level lan- fer of data to and from the primary stor-
guages into object code and then into ma- age.
chine code
A. LU
A. Assembler
B. AU
B. Compiler
C. Interpreter C. ALU
D. none of above D. CU

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer-System Organization 17

70. In the case of, Zero-address instruction C. Application software


method the operands are stored in D. Utility program

PRACTICE BOOK» NOT FOR SALE


A. Register
76. A system having only two states is said to
B. Accumulator be
C. cache A. Boolean values
D. push down stack B. Binary
71. Which are not as open source software C. None
A. Libre office D. Both
B. mysql 77. A kilobyte (kB) is bytes or 210 bytes
C. MS office A. 1, 008
D. python B. 1, 000
E. coral draw C. 1, 024
D. 1, 224
72. The BSA instruction is
A. . Branch and store accumulator 78. Highly encoded schemes that use compact
codes to specify a small number of func-
B. Branch and save return address tions in each micro instruction is
C. Branch and Show return address A. Horizontal organisation
D. Branch and Show accumulator B. Vertical organisation
73. Which register is being described? Holds C. Diagonal organisation
the data / instructions that have been D. None of the mentioned
fetched from memory
79. The small extremely fast RAM is called as
A. MAR
B. MDR
A. Heap
C. Accumulator B. Stack
D. Program Counter C. Cache
74. One is about 1 million bytes. D. Accumulator
A. terabyte 80. Which statement is TRUE?
B. gigabyte A. Registers are super fast memory,
C. megabyte stores tiny instructions which can be ac-
cessed by the CPU quickly
D. kilobyte
B. Registers are super fast memory,
75. a set of programs containing instruc- stores lots of instructions which can be ac-
tions that work together to coordinate all cessed by the CPU slowly
the activities among computer hardware C. Registers are a type of primary mem-
resources ory which is used to access the state of
A. Operating system the control unit
B. System Software D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer-System Organization 18

81. The faster, costlier and relatively small 86. The fetch and execution cycles are inter-
from of storage managed by computer sys- leaved with the help of
tem hardware is: A. Modification in processor architecture
A. Main Memory B. Clock
B. Flash Memory C. Special unit
C. Cache memory D. Control unit
D. Virtual Memory 87. In cache memory, the word is written

NARAYAN CHANGDER
into cache and main memory at the same
82. Which register is being described? Holds
time.
the memory address of the instruction for
each cycle A. copy-back

A. MAR B. write-through
C. copy-both
B. MDR
D. write-back
C. Accumulator
D. Program Counter 88. Which of these storage devices are volatile
A. RAM
83. The CPU has two modes privileged and B. Flash Memory
non-privileged. In order to change the
mode from privileged to non-privileged, C. CD-RW
is needed. D. SSD
A. a hardware interrupt 89. What is a flash drive an example of?
B. a software interrupt A. Software
C. either hardware or software interrupt B. Storage Device
D. a non-privileged instruction C. Hardware
D. Input Device
84. Which is not a function of OS
90. In A or B and C what operation occurs
A. process management
first?
B. managing memory
A. A or B
C. logical operation B. B and C
D. allocating resources C. Both simultaneously
85. What part of the CPU is being de- D. none of above
scribed.Very fast memory which stores 91. CISC stands for
regularly used instructions. CPU can ac-
cess instructions held here quicker than A. Complete Instruction Sequential Com-
from RAM pilation
B. Computer Integrated Sequential Com-
A. ALU
piler
B. Control Unit
C. Complex Instruction Set Computer
C. Cache D. Complex Instruction Sequential Compi-
D. none of above lation

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer-System Organization 19

92. Interrupts form an important part of 98. The addressing mode/s, which uses the PC
systems. instead of a general purpose register is
A. Indexed Addressing mode

PRACTICE BOOK» NOT FOR SALE


A. Batch Processing
B. Multitasking B. Relative Addressing mode
C. Real-time processing C. Direct Addressing mode
D. Multi-user D. Indirect Addressing mode

93. What kind of laser does Blu-ray disc use? 99. Which of the following is used to hold
ROM, RAM, CPU and expansion cards?
A. Blue-red laser
A. Computer Bus
B. Blue-green laser
B. Mother Board
C. Blue-violet laser
C. Cache
D. Purple-green laser
D. None
94. Where, data will remain intact even when 100. Built in memory of computer is
the computer is turned of
A. EROM
A. Secondary Storage device
B. ROM
B. Primary Storage device
C. RAM
C. Motherboard
D. PROM
D. RAM
101. To increase the speed of memory access
95. which all are not an input device in pipelining, we make use of
A. web camera A. Special memory locations
B. biometric sensor B. Special purpose registers
C. sound card C. Cache
D. smart card reader D. Buffers
E. plasma display 102. Which of the following medium is used
between CPU & RAM TO speed up the pro-
96. Choose the odd one
cessing power of a CPU?
A. Windows
A. Virtual Memory
B. Solaris B. Flash Memory
C. Linux C. cache memory
D. Outlook D. Main Memory
97. A bus scores over a multistage switching 103. The load instruction is mostly used to des-
network in which one of the following as- ignate a transfer from memory to a proces-
pects sor register known as
A. Reliability A. Accumulator
B. Speed B. Instruction Register
C. Scalability C. Program counter
D. Cost of Performing D. Memory address Register

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 20

104. The binary equivalent for the decimal no B. 1101


15 is C. 1110
A. 0111 D. 1111

1.3 Computer-System Architecture


1. When power is supplied to the system B. Cache

NARAYAN CHANGDER
then to maintain data with the life of bat- C. Registers
tery, computer BIOS contains the follow-
ing. D. External Memory

A. CPU 6. Which of these describes the number of in-


B. RAM structions a CPU can process per second?

C. CMOS A. Clock Speed

D. DRAM B. Control Unit


C. Memory
2. It consists of hardware and software that
D. none of above
transport programs and data between in-
terconnected computer systems. 7. In general, the have the smallest bit
A. Data size and the have the largest.
B. Software A. EEPROMs, Flash
C. Hardware B. SRAM, mask ROM
D. Communication C. DRAM, PROM
D. mask ROM, SRAM
3. Which part of the CPU will decode the in-
struction in the memory data register? 8. This type of computer architecture uses
A. Control Unit software. The program being run and the
data it is using are both stored in tempo-
B. Arithmetic and logic unit (ALU)
rary memory close to the CPU.
C. Registers
A. Von Neumann architecture
D. none of above
B. Computer architecture
4. Which architecture provides separate C. System architecture
buses for program and data memory? D. Building architecture
A. Von Neumann architecture.
9. Consider a direct mapped cache with block
B. Harvard architecture. size 4 KB. The size of main memory is 16
C. Harvard and Von Neumann architec- GB and there are 10 bits in the tag. Find
ture. the number of bits in block offset.
D. Von Harvard architecture. A. 8 bits
5. Which one of the following is the smallest B. 12 bits
memory? C. 16 bits
A. Main Memory D. 32 bits

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 21

10. It is a type of a non-volatile storage media 15. Four bits is called a


that stores data on a series of solid-state
A. Bit
flask memory.

PRACTICE BOOK» NOT FOR SALE


B. Byte
A. HDD
C. Nibble
B. Flash Drive
C. SSD D. none of above

D. Magnetic Tape 16. It is the process of splitting the system


into smaller chuncks so people can work
11. What is an area for storing web pages? better by working on smaller separate
A. cache tasks.
B. the internet A. Composition
C. RAN B. Compound
D. a core C. Decomposition

12. What will be the output from a D flip-flop D. Clustering


if D = 1 and the clock is low?
17. Which one is an example of flash mem-
A. 1 ory?
B. No change A. SD Card
C. 0 B. RAM
D. 3 C. ROM
13. The ALU carries out arithmetic and logic op- D. Cache
erations. It processes numbers rather
than decimal numbers. 18. In the CPU, this is a register which holds
the memory address of the instruction for
A. binary
each cycle.
B. decimal
A. Program counter
C. hexadecimal
B. Accumulator
D. All of the above
C. Memory address register (MAR)
14. Tick the correct statements about the CPU D. Memory data register (MDR)
in a computer.
A. CPU stands for Central Processing 19. Which of these statements about Von Neu-
Unit mann architecture is true?
B. The CPU fetch and decodes instruc- A. Only data is stored in primary memory
tions B. Only instructions are stored in primary
C. The speed of the CPU is usually in GHz memory
D. If a CPU has many cores, this slows C. Data and instructions are both stored
down the computer. in primary memory
E. The hard disk is part of the CPU. D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 22

20. What are the two types of barcode (select A. Yes


two)? B. Not possible using Add, we’ve to use
A. QR code AddSetCC
B. Linear barcode C. Not permitted
C. Spliced code D. None of the mentioned
D. Grey barcode 26. Carries out the calculations and logical de-
cisions. The results of its calculations are

NARAYAN CHANGDER
21. The condition flag Z is set to 1 to indicate
stored in the accumulator.
A. CPU
A. The operation has resulted in an error
B. Control Unit
B. The operation requires an interrupt
call C. Arithmetic and Logic Unit
C. The result is zero D. Memory Address Register
D. There is no empty register available 27. A typical processor speed in 2016 was
22. Sends data between the processor, the A. 16-17 Hz
memory unit and the input/output de- B. 100MHz
vices.
C. 4-5GHz
A. Address bus
D. 300GHz
B. Data bus
28. Data and instructions are transferred from
C. Control bus
these devices.
D. none of above
A. CPU
23. Which answer is not a cache type? B. Main Memory
A. half-mapped cache C. Input devices
B. fully associative cache D. Output devices
C. N-way-set-associative cache E. Bus
D. direct-mapped cache 29. Which of these does not affect CPU perfor-
24. One of the dedicated registers in the pro- mance?
cessor that holds the location of where A. Clock Speed
data will be read or written to as the re- B. Number of Cores
sult of an operation is called the
C. Cache Size
A. Memory Address Register
D. Number of Instructions in a Program
B. Memory Buffer Register
C. Current Instruction Register 30. This is not a type of secondary storage

D. Program Counter A. Blu-Ray Drive/Disc


B. Flash Memory
25. Can you perform an addition on three
operands simultaneously in ALU using Add C. Hard Disk Drive
instruction? D. RAM

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 23

31. How can a bigger cache improve CPU per- 36. What is the program counters job?
formance? A. To count the programs

PRACTICE BOOK» NOT FOR SALE


A. By being able to carry out more calcu- B. It contains the memory address of the
lations next instruction to be loaded
B. By being able to store more re- C. It stores instructions
cently used instruction inside the CPU for
quicker access times D. It carries out the calculations
C. By being able to 37. ROM and RAM are both
D. none of above A. Types of Memory
32. Which of these don’t happen during the B. Types of Computer
fetch part of the fetch-execute cycle? C. Types of Food
A. Address Bus is used D. Types of Work
B. Program Counter incremented
38. What does PC stand for in Computer Archi-
C. Arithmetic Operations performed tecture?
D. Main Memory addressed A. Program Counter
33. Which of these doesn’t affect the perfor- B. Personal Computer
mance of the computer? C. Placement Counter
A. Clock Speed D. Probably Correct
B. Number Of Cores
39. It is u.sed to characterize a certain object
C. Cache Size at different levels of representation offer-
D. The Number Of Instructions In The ing models
Program A. Abstraction
34. The CPU checks to see if an interrupt has B. Concept
occurred and requires servicing. The check
C. Method
is made
D. Architecture
A. after the execute section of the the
fetch-decode-execute cycle 40. What is the name of the unit in the CPU
B. during the fetch section of the the that performs arithmetic and logic opera-
fetch-decode-execute cycle tions?
C. during the execute section of the the A. ALU
fetch-decode-execute cycle B. CU
D. during the decode section of the the C. MAR
fetch-decode-execute cycle
D. MDR
35. check all that are Computer Functions
41. How many types of architectures are avail-
A. Sorting able, for designing a device that is able to
B. Retrieving work on its own?
C. Read images A. 3
D. Processing Data B. 1

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 24

C. 2 47. A quad core processor has how many cores


D. 4 A. 1
B. 2
42. Which of the following is a means of Out-
put? C. 4
A. Monitor D. 8
B. Speakers 48. Which of the following memories below is
often used in typical computer operation?

NARAYAN CHANGDER
C. Printer
A. FDD
D. All of the Above
B. HDD
43. Which one of the following can be called
C. DRAM
as a peripheral?
D. None of these
A. Control unit
B. Arithmetic unit 49. The CU
A. does any maths or logic problems for
C. Speaker
the CPU
D. Logic unit
B. stores data inside the CPU
E. Main memory.
C. manages the cycle and decodes in-
44. Which architecture is followed by general structions
purpose microprocessors? D. holds specific data for the fetch-
A. Harvard architecture decode-execute cycle

B. Von Neumann architecture 50. Register:stores the most recently fetched


instruction, waiting to be decoded.
C. None of the mentioned
A. Memory data register
D. All of the mentioned
B. Memory address register
45. What acts as an intermediary between the C. Accumulator
processor and the Main Memory? (6-9)
D. Current instruction register
A. Bus
51. This computer component keeps all of the
B. User
computer’s operations synchronized:
C. Cache
A. CPU bus
D. Clock B. CPU clock
46. The higher the clock speed C. CPU CMOS
A. The greater number of instructions D. CPU battery
that can be carried out per second.
52. Second-level system bus that connects the
B. The lower the number of instructions memory subsystem to the chipset and the
that can be carried out per second. processor is referred to as
C. The faster your clock will go. A. cache bus
D. The more cores you will have. B. processor bus

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 25

C. standard I/O bus 58. This carries address of the next instruction
that will be fetched (4-6)
D. memory bus

PRACTICE BOOK» NOT FOR SALE


A. Address Bus
53. A processor performing fetch or decoding B. Data Bus
of different instruction during the execu-
tion of another instruction is called C. Control Bus
A. Super-scaling D. System Bus

B. Pipe-lining 59. To get data from RAM, memory addresses


C. Parallel Computation are sent from the CPU down the

D. None of the mentioned A. bus.


B. registers.
54. This would reduce the number of mem-
C. ROM.
ory/processor transfers (5-7)
D. cache.
A. Arithmetic Logic Unit
B. Accumulator 60. Two processors A and B have clock fre-
quencies of 700 Mhz and 900 Mhz respec-
C. Cache tively. Suppose A can execute an instruc-
D. Control Unit tion with an average of 3 steps and B
can execute with an average of 5 steps.
55. In the case of, Zero-address instruction For the execution of the same instruction
method the operands are stored in which processor is faster?
A. Registers A. A
B. Accumulators B. B

C. Push down stack C. Both take the same time

D. Cache D. Insufficient information

61. how many instructions per second can a 3


56. The circuit used to store 1 bit of informa-
Hertz Clock Speed CPU process each sec-
tion
ond?
A. Logic Gates
A. 3
B. Flip flop
B. 30
C. Latch C. 300
D. Decoder D. none of above
57. Assembly language is a 62. What does CPU stand for?
A. High Level Language A. Computer Processing Unit
B. Low Level Language B. Central Processing Unit
C. Machine Language C. Computer Processing Utility
D. Programming Language D. Computer Peripheral Unit

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 26

63. This would perform an operation such as 69. Which part of the CPU holds the memory
5+8 address of the next instruction in the cy-
A. Control Unit cle?
B. Arithmetic Logic Unit A. Accumulator

C. Cache B. Memory Address Register

D. Accumulator C. Memory Data Register


D. Program Counter
64. Which part of the CPU will send signals

NARAYAN CHANGDER
to the memory, ALU and the input/output 70. Where are results of calculations held?
devices? A. Memory Address Register
A. ALU B. Memory Data Register
B. Control Unit C. Program Counter
C. Memory Address Register (MDR) D. Accumulator
D. Memory Data Register (MDR) 71. How many fetch-decode-execute cycles
65. Which of the register/s of the processor would you expect a 2GHz processor to
is/are connected to Memory Bus? complete per second?

A. PC A. Two hundred (200)

B. MAR B. Two thousand (2000)


C. Two million (2, 000, 000)
C. IR
D. Two billion (2, 000, 000, 000)
D. Both PC and MAR
72. What is a core?
66. Which of the following file systems does
not have a built-in security? A. A processing unit in a CPU.
A. ext3 B. Pixels on a screen.
B. ext4 C. The centre of an apple.
C. FAT D. Data store.
D. HFS 73. Which of the following is an example of
‘main memory’.
67. What was Von Neumanns first name?
A. Hard Drive
A. Terry
B. USB Drive
B. Adam
C. RAM
C. John
D. ROM
D. Philip
74. When using the Big Endian assignment to
68. How must the output of a gate in a TTL store a number, the sign bit of the number
digital circuit act when it is HIGH? is stored in
A. Acts as a voltage source A. The higher order byte of the word
B. Acts as a current source B. The lower order byte of the word
C. 2 C. Can’t say
D. 1 D. None of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 27

75. Which is not an integral part of computer? 80. The main advantage of multiple bus organ-
A. CPU isation over a single bus is

PRACTICE BOOK» NOT FOR SALE


B. Mouse A. Reduction in the number of cycles for
execution
C. Monitor
B. Increase in size of the registers
D. UPS
C. Better Connectivity
76. Solid state drives (SSD) have no moving D. None of the mentioned
parts and have faster read and write times
than a HDD. A good current (2019) data 81. Which of the following OSs use the NT ker-
access time foran SSD is nel
A. less than 100 µ s (micro-seconds) A. Windows 7
B. less than 1 µ s (micro-seconds) B. Windows 3.11
C. less than 100 ms (micro-seconds) C. Mac OS X
D. less than 100 ns (micro-seconds) D. Chrome OS

77. If a system is 64 bit machine, then the 82. CMOS sensors are used as well as CCD sen-
length of each word will be sors in cameras. CCD sensors are reported
A. 4 bytes as being more reliable, yet have

B. 8 bytes A. a much higher power consumption


than CMOS
C. 16 bytes
B. a much lower power consumption than
D. 12 bytes CMOS
78. The stage delays in a 4 stage pipeline are C. less lifetime
800, 500, 400 and 300 picoseconds. The D. a tendancy to burn out
first stage is replaced with a functionally
equivalent design involving two stages 83. Processors have a speed measured in
with respective delays 600 and 350 pi- A. Hertz
coseconds.The throughput increase of the
pipeline is %. B. Bits
A. 31.33% C. Bytes
B. 32.33% D. Seconds
C. 33.33% 84. The Arithmetic Logic Unit (ALU)
D. 34.33% A. Carries out numerical calculations and
logical decisions
79. The amount of times your CPU can com-
plete the fetch-decode-execute cycle is B. Calculates the different items of num-
known as ber data stored within the Accumulator
and converts them into logical decisions
A. The clock speed
C. Calculates graphic data as they are
B. The number of cores only found within GPU units.
C. The cache D. Calculates the flow of execution in a
D. The RAM program and decodes instructions into

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 28

small steps to be carried out by the pro- A. 34 bits


gram counter. B. 32 bits
85. Select ALL of the things that affect the per- C. 16 bits
formance of a CPU D. 8 bits
A. Number of cores (Single, Dual, Quad)
90. What does the word “SSD” stand for?
B. Size of Cache Memory
A. Solid State Drive
C. Clock Speed

NARAYAN CHANGDER
B. Soluble State Drive
D. Size of HDD
C. Solid Static Drive
86. What are registers used for?
D. Static Solid Drive
A. To check that students are in school.
91. *Consider a direct mapped cache with block
B. To temporarily hold bits of data
size 4 KB. The size of main memory is 16
needed by the CPU.
GB and there are 10 bits in the tag. Find
C. To make sure that the CPU runs prop- the number of bits in line number.
erly.
A. 16 bits
D. To make the CPU faster.
B. 8 bits
87. The three steps to processing instructions C. 12 bits
given by a currently running program
D. 32 bits
A. Fetch, decode, execute
B. Fetch, perform, operate 92. The small extremely fast, RAM’s are
called as
C. Collect, decode, operate
A. Cache
D. Collect, analyse, execute
B. Heaps
88. When we use auto increment or auto decre- C. Accumulators
ment, which of the following is/are true?
1) In both, the address is used to retrieve D. Stacks
the operand and then the address gets al-
93. What is this process called:The CPU makes
tered 2) In auto increment, the operand
sense of the instruction it has just fetched.
is retrieved first and then the address al-
tered 3) Both of them can be used on gen- A. Decode
eral purpose registers as well as memory B. Execute
locations
C. Process
A. 1, 2, 3
D. Fetch
B. 2
94. What is a bus?
C. 1, 3
D. 2, 3 A. A circuit that connect one part of CPU
to other components.
89. Consider a direct mapped cache with block B. A type of long term memory
size 4 KB. The size of main memory is 16
GB and there are 10 bits in the tag. Find C. A type of permanent memory
the number of bits in physical address. D. A method of transport

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 29

95. The addressing mode/s, which uses the PC 100. During the execution of the instructions,
instead of a general purpose register is a copy of the instructions is placed in the

PRACTICE BOOK» NOT FOR SALE


A. Indexed with offset
A. Register
B. Relative
B. RAM
C. Direct
C. System heap
D. Both Indexed with offset and direct
D. Cache
96. Microprocessors can be used to make
101. Built-in set of machine code instructions
A. Computer of computer are called
B. digital system A. instruction set
C. Calculators B. transfer of data
D. All of these C. logical operations
97. CCD sensors are used to read the intensity D. logical set
of the light from a laser, to make an identi-
102. The CPU addressing mode (with an in-
cal pattern in the computer memory. What
struction) where you place the memory ad-
does the acronym CCD stand for?
dress to be operated on is called
A. Charge-coupled device
A. Direct addressing
B. Current-coupled device B. Immediate addressing
C. Charge-created device C. Indirect addressing
D. Charge-coupled detector D. Sequential addressing
98. Where would 5 + 8 be performed? 103. If the processing speed goes up from
A. Arithmetic Logic Unit 2GHZ to 4GHZ and the number of cores
goes from 2 to 4-what is the exact effect
B. Accumulator on the performance of the computer? (5-
C. Cache 6)
D. Control Unit A. The maximum number of instructions
executed per second doubles
99. Which of below can solve issue with prop-
B. The maximum number of instructions
agation delay? (Note:Propagation delay
executed per second quadruples
is the amount of time it takes for the head
of the signal to travel from the sender to C. The maximum number of instructions
the receiver.) executed per second is halved
A. Use Multiple buses D. The maximum number of instructions
executed per second is quartered 7
B. Minimize number of I/O module within
a system 104. The output of a gate is only 1 when
C. Increase number of lines for each type both inputs are 1.
of bus. A. OR
D. none of above B. NOT

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 30

C. NAND 110. This doesn’t happen during the Fetch part


D. AND of the cycle:(7-9)
A. Address Bus is used
105. FSB stands for
B. Program Counter increments by one
A. Front Side Battery
B. Far Side Bus C. Arithmetic operations are performed

C. Front Side Bus D. Main Memory is addressed

NARAYAN CHANGDER
D. FSB
111. What are the basic gates in MOS logic
106. While using the iterative construct family?
(Branching) in execution instruction A. NAND and NOR
is used to check the condition.
B. AND and OR
A. TestAndSet
C. NAND and OR
B. Branch
C. TestCondn D. AND and NOR What are the basic gates
in MOS logic family? NAND and NOR
D. None of the mentioned

107. are used to translate high level lan- 112. Select two of many factors that affect
guage programs into machine code processor performance

A. Assemblers A. Word length


B. Compilers B. The size of cache memory
C. Interpreters C. The speed of the hard drive
D. None of these D. The rate the user clicks
108. It pertains to the data that changes from
113. What Do the letters PC stand for in the
one form to another due to instruction or
PC Register
need.
A. Data sorting A. Program Counter

B. Basic Arithmetic and logical calcula- B. Process Counter


tions C. Programmer Counter
C. Data transformation or translation
D. Counter Strike
D. Searching for data matches
114. This internal computer component is
109. From the hard drive’s perspective, mov- erased every time the computer is turned
ing a file is a analogous to which of the off.
following actions?
A. hard drive
A. Copy and paste
B. Cut and paste B. processor

C. Delete and paste C. random access memory (RAM)


D. Renaming D. keyboard

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 31

115. Accumulator 119. What is held in ROM? (1-4)


A. Stores the address of the next instruc- A. Data currently in use

PRACTICE BOOK» NOT FOR SALE


tion in memory B. Bootstrap Loader
B. Stores the address of where the next C. Instructions frequently used
item will be fetched from
D. Operating System
C. Stores data fetched from memory, or
waiting to be stored in memory 120. The Instruction fetch phase ends with
D. Stores the result of arithmetic calcula- A. Placing the data from the address in
tions MAR into MDR
B. Placing the address of the data into
116. What is Backside Bus within Bus Hierar- MAR
chy?
C. Completing the execution of the data
A. The highest-level bus that the chipset and placing its storage address into MAR
uses to send information to and from the
processor. D. Decoding the data in MDR and placing
it in IR
B. Higher-level architectures which em-
ploy a dedicated bus for accessing the sys- 121. The memory which is used to store the
tem cache copy of data or instructions stored in
larger memories, inside the CPU is called
C. Second-level system bus that connects
the memory subsystem to the chipset and
the processor A. Level 1 cache
D. High-speed input/output bus used for B. Level 2 cache
connecting performance-critical peripher- C. Registers
als to the memory, chipset, and processor
D. TLB
117. The Central Processing Unit or CPU con-
122. If the processing speed goes from 2GHz
tains two sub-Components which are
to 4GHz, and we go from dual-core to
A. Main memory & Bus quad-core, what effect does this have on
performance?
B. Input & Output Devices
A. The maximum number of instructions
C. he Arithmetic/Logic Unit (ALU) and the
executed per second doubles
control unit (CU)
B. The maximum number of instructions
D. none of above executed per second quadruples
118. is a technique used when the proces- C. The maximum number of instructions
sor runs at less than the rated speed to executed per second halves
conserve power or produce less heat. D. The maximum number of instructions
A. CPU throttling executed per second quarters
B. Bit 123. What is the job of the control unit?
C. A multicore A. It carries out calculations
D. Throttling B. It stores information.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 32

C. It does nothing. 129. The CPU is:


D. It controls the input and output of data A. Control processing unit
to make sure that it gets to the right place. B. Centralised process unit

124. CPU can directly understand this lan- C. Central process unified
guage D. Central processing unit
A. C 130. computer architecture (Choose 2 answers
)

NARAYAN CHANGDER
B. Assembly language
A. Harvard
C. Machine language
B. Instruction Set Architecture
D. JAVA
C. Microarchitecture
125. The addressing mode, where you directly D. Von Neumann
specify the operand value is
131. Which of the following is not part of the
A. Immediate CPU?
B. Direct A. ALU
C. Definite B. CU
D. Relative C. MAR
D. ROM
126. When something is loaded from memory,
where is the memory address stored? 132. A in RAM stands for
A. The CIR A. Access

B. The MAR B. Accessible


C. Against
C. The MDR
D. All
D. The ALU
133. Performs calculations (i.e. addition, divi-
127. Current day processors function using sion, multiplication, subtraction)
three main operations. In order they are A. MAR (Memory Address Register)
A. Fetch, decode and execute B. MDR (Memory Data Register)
B. Execute, fetch and decode C. CIR (Current Instruction Register)
C. Clear, Fetch and execute D. PC (Program Counter)
D. Fetch, assemble and execute E. ALU (Arithmetic and Logic Unit)
134. The Input devices can send information to
128. What is a property of an Address Bus (4-
the processor.
6)
A. When the SIN status flag is set
A. Carries Data and Instructions
B. When the data arrives regardless of
B. Uni-Directional the SIN flag
C. Bi-Directional C. Either of the cases
D. Carries control Signals D. Neither of the cases

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 33

135. It converts discrete signals into highs and C. Input devices


lows, hence the binary equivalent of a D. Output devices
time-bound discrete signal.

PRACTICE BOOK» NOT FOR SALE


E. Bus
A. Sampling
B. Quantization 141. What is the purpose of the accumulator?
C. Encoding A. To perform arithmetic operations
D. Decoding B. To hold the results of a calculation
C. To hold the accumulation of instruc-
136. What can a small amount of RAM also be
tions
known as
A. cache D. To store calculations in memory

B. not much 142. It pertains to the arrangement of data by


C. Clock speed a list or specific criterion or criteria.

D. CPU A. Data transformation or translation


B. Data storage and retrieval
137. SPEC stands for
C. Data movement
A. Standard Performance Evaluation
Code D. Data sorting
B. System Processing Enhancing Code 143. is a type of system software allows
C. System Performance Evaluation Cor- that allow a user to perform maintenance-
poration type tasks
D. Standard Processing Enhancement A. Operating system
Corporation B. System Software
138. To reduce the memory access time we C. Application software
generally make use of D. Utility program
A. Heaps
144. Very small but fast memory between the
B. Higher capacity RAM’s
processor and main memory?
C. SDRAM’s
A. Bus
D. Cache’s
B. User
139. Which is not part of a hard disk drive? C. Cache
A. Spindle D. Clock
B. Platter
145. Computer memory which allows the si-
C. Read/write head multaneous read and write operations
D. Valve A. ROM
140. It stores both data and instructions. B. RAM
A. CPU C. EPROM
B. Main Memory D. EEPROM

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 34

146. This is secondary storage: C. More programs and data can be


A. CPU opened at the same time

B. GPU D. The computer will be quicker if you


open a document
C. USB
D. RAM 152. The ALU
A. does any maths or logic problems for
147. What are the two other parts of the CPU
the CPU
that you learned?

NARAYAN CHANGDER
B. stores data inside the CPU
A. RAM & ROM
B. Hard Drive & Motherboard C. sends out control signals for the CPU

C. The ALU and Cache D. holds specific data for the fetch-
decode-execute cycle
D. none of above
153. During the execution of a program which
148. Which of these scenarios is NOT the re- gets initialized first?
sult of overclocking?
A. MDR
A. The computer will end up displaying
the incorrect time and date B. IR
B. Processes might not be completed be- C. PC
fore the next instruction is carried out D. MAR
C. The CPU could overheat
154. According to the von Neumann model,
D. none of above are stored in memory.
149. b Which register is being described? A. only data
Stores the results of the calculations done B. only programs
by the ALU
C. data & programs
A. MAR
D. neither data nor programs
B. MDR
C. Accumulator 155. What are the utilities is an OS called that
enable programs such as a screen reader?
D. Program Counter
A. Accessibility options
150. This would send a signal such as “Mem-
ory Read” (5-7) B. Reading options

A. Arithmetic Logic Unit C. User options


B. Accumulator D. User account settings
C. Cache 156. What is held in cache? (5-6)
D. Control Unit A. All of the programming instructions
151. If the RAM is upgraded from 512MB to B. Commonly used instructions and data
4GB, what will be the biggest benefit? C. Instructions that have been processed
A. The operating system will be faster D. Data that hasn’t been used for a long
B. There will be more hard drive space time

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 35

157. The bus used to connect the monitor to that stores data and program code in sep-
the CPU is arate memories. What is this architecture
called?

PRACTICE BOOK» NOT FOR SALE


A. PCI bus
A. Harvard
B. SCSI bus
B. Hartford
C. Memory bus
C. Hacienda
D. Rambus
D. Haiku
158. The address bus is
163. Moore’s Law? (7-9)
A. Uni-directional and controlled by the
A. Predicted that the number of transis-
CPU
tors on a circuit board would double ever
B. Bi-directional and controlled by the year
CPU
B. Computers would be capable of think-
C. Uni-directional and controlled by the ing and learning for themselves by 2020
memory C. That the number of cores on a proces-
D. Uni-directional and controlled by the sor would double every year
memory D. The performance increase of comput-
ers would eventually halt in 2020
159. The effective address of the following in-
struction is MUL 5(R1, R2). 164. A source program is usually in
A. 5+R1+R2 A. Assembly language
B. 5+(R1*R2) B. Machine level language
C. 5+[R1]+[R2] C. High-level language
D. 5*([R1]+[R2]) D. Natural language

160. Size of the memory mainly depends 165. Examples of an embedded systems are
on the size of the address bus. A. Laptops
A. Main B. Washing machine
B. Virtual C. Desktop
C. Secondary D. Lights in a car
D. Cache 166. How does a CPU process instructions?
A. Using the Fetch Decode Execute cycle
161. Windows, Icons, menus and Pointers are
all part of this? (1-4) B. Linearly using parallel processing
A. Graphical User Interface C. Using machine code
B. Command Line Interface D. Through the Control Bus
C. Menu Interface 167. b What are the MDR and MAR?
D. No User Interface A. Cache
B. Registers
162. The von Neumann architecture stores
data and program code in the same inter- C. Accumulator
nal memory. There is another architecture D. Program Counter

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 36

168. Charlie uses social media regularly. What C. 3.2


step would you recommend to be more se-
D. 2.0
cure online?
A. Always use the same password 173. These are images that are characterized
B. Only post non-private data/pictures using an image scanner, digital camera or
C. Always use a mobile phone for secu- mobile device, or video camera frame grab-
rity ber.

NARAYAN CHANGDER
D. Share other people’s pictures as much A. Bitmap objects
as possible B. Graphical objects
169. Data and instructions in use are stored in C. 3D image
the
D. Objects
A. Processor
B. Embedded System 174. What does a direct mapped cache type
C. Hard Disk Drive do?
D. Main Memory A. each main memory address maps to
exactly one cache block
170. This DOESN’T happen during the Fetch
part of the cycle B. each main memory address maps to
A. Address Bus is used exactly 10 cache blocks
B. Program Counter increments by one C. each main memory address maps to
exactly 4 cache blocks
C. Arithmetic operations are performed
D. Main Memory is addressed D. each main memory address maps to
exactly 2 cache blocks
171. This sends signals such as “I/O Read” (5-
7) 175. The main advantage of semiconductor
A. Arithmetic Logic Unit RAM is its ability to:
B. Accumulator A. retain stored data when power is inter-
C. Cache rupted or turned off
D. Control Unit B. be written to and read from rapidly

172. Consider a non-pipelined processor with C. be randomly accessed


a clock rate of 2.5 gigahertz and average D. be sequentially accessed
cycles per instruction of 4. The same pro-
cessor is upgraded to a pipelined proces-
176. An interrupt breaks the execution of in-
sor with five stages but due to the internal
structions and diverts its execution to
pipeline delay, the clock speed is reduced
to 2 gigahertz. Assume there are no stalls A. Interrupt service routine
in the pipeline. The speed up achieved in
B. Counter word register
this pipelined processor is-
A. 3.0 C. Execution unit
B. 2.2 D. control unit

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 37

177. The clock rate of the processor can be im- B. AGP


proved by C. VESA

PRACTICE BOOK» NOT FOR SALE


A. Improving the IC technology of the D. ISA
logic circuits
B. Reducing the amount of processing 183. Holds the instruction that is being pro-
done in one step cessed (and translated) or executed
C. By using the overclocking method A. MAR (Memory Address Register)
D. All of the mentioned B. MDR (Memory Data Register)
C. CIR (Current Instruction Register)
178. The number of independent processors in
your CPU is known as D. PC (Program Counter)
A. The clock speed E. ALU (Arithmetic and Logic Unit)
B. The number of cores 184. Holds the data that is being transferred
C. The cache to or from memory.
D. The RAM A. MAR (Memory Address Register)
B. MDR (Memory Data Register)
179. It provides addition information about a
certain item’s content. C. CIR (Current Instruction Register)
A. File Format D. PC (Program Counter)
B. Metadata E. ALU (Arithmetic and Logic Unit)
C. File Attributes 185. How many of the following are examples
D. File Type of Embedded Systems?
A. Mobile Phone
180. This is not a type of secondary storage
(1-4) B. Washing Machine
A. Blu-Ray Drive/Disc C. Microwave
B. Flash Memory D. Fridge
C. Hard Disk Drive E. Laptop
D. RAM 186. The cache memory
181. What are cores used for? A. does any maths or logic problems for
A. They receive instruction and perform the CPU
them. B. stores frequently used instructions
B. Compost close to the CPU

C. Illuminating the screen. C. sends out control signals for the CPU

D. Storing data. D. holds specific data for the fetch-


decode-execute cycle
182. X is faster than PCI bus. It is dedicated to
the acceleration of graphics performance. 187. What is the purpose of address bus?
What is X? A. To provide data to and from the chip.
A. PCI express B. To select a specified chip.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 38

C. To select a location within the memory 193. If the number of cores goes up from 2
chip. to 4-what is the exact effect on perfor-
D. To select a read/write cycle. mance? (1-4)
A. Performance decreases
188. it’s job is to perform arithmetic and
logic operations on data and B. The maximum number of instructions
executed per second doubles
A. The Arithmetic/Logic Unit(ALU)
B. Bus C. The maximum number of instructions

NARAYAN CHANGDER
executed per second quadruples
C. Input Device
D. The maximum number of instructions
D. none of above executed per second is halved
189. Data stored in the is permanent and
194. Select a drawback of making a dual core
is rarely changed as it effects how the soft-
or quad core CPU, rather than a single core
ware operates
one.
A. BIOS
A. they are more expensive to design and
B. RAM make, and they also use more power than
C. ROM single or dual core processors.
D. Hard Drive B. they are larger in size, thus requiring
a larger case.
190. In a Von Neumann architecture
C. they produce a lot of heat, so wont re-
A. data and instructions are both stored
quire a heat sink as a result.
in main memory.
D. They are easier to design and make,
B. data and instructions are stored in sep-
and they also use less power than single
arate memory devices.
or dual core CPUs.
C. data is stored in main memory, instruc-
tions in secondary storage. 195. The Control Unit
D. data is stored in secondary storage, in- A. Controls the flow of data around the
structions in main memory. CPU and also decodes instructions
191. Carries signals relating to addresses be- B. Only controls the flow of data around
tween the processors and the memory. the CPU
A. Address bus C. Only decodes instructions
B. Data bus D. Controls how much power is directed
C. Control bus to all components within the computer
D. none of above 196. The format is usually used to store
192. Processor don’t do the following (1-4) data.

A. Process Data A. BCD


B. Execute Instructions B. DECIMAL
C. Execute Data C. HEXADECIMAL
D. Operate in Hz D. OCTAL

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 39

197. What is held in cache? 203. The internal components of the processor
A. All of the programming instructions are connected by
A. Processor intra-connectivity circuitry

PRACTICE BOOK» NOT FOR SALE


B. Commonly used instructions and data
C. Instructions that have been processed B. Processor bus

D. Data that hasn’t been used for a long C. Memory bus


time D. Rambus

198. It is a name given to a specific kind of 204. The CPU is called the of the computer.
file. A. arm
A. File Format B. mother
B. Metadata C. brains
C. File Attributes D. leg
D. File Type 205. What doesn’t affect the performance of
199. RAM is memory, meaning that when the computer (1-4)
the system is shutdown, the contents of A. Clock Speed
RAM are erased. B. Number of Cores
A. non-volatile C. Cache Size
B. extra D. The number of instructions in the pro-
C. volatile gram
D. secret 206. The CPU is:(1-4)
200. What is clock speed measured in? A. Control processing unit
A. Cycles per minute B. Centralised process unit
B. Cycles per second C. Central process unified
C. Cycles per hour D. Central processing unit
D. none of above 207. Firmware refers to (5-6)
A. Any hardware that can’t easily break
201. If a bus has 24 lines, it has an address-
able range (or maximum number of ad- B. A combination of hardware and soft-
dressable cells) of ware
A. 16.7M C. A type of software that is updated to
make a computer work better
B. 65.5K
D. Hardware used in kitchens
C. 17.6M
D. 4.3B 208. The processor is connected to the main
memory and other internal computer com-
202. C, C++, Java languages are ponents. They are the
A. High Level Language A. Address, Data and control buses
B. Assembly Language B. Address, input and control buses
C. Machine Language C. Address, Data and output buses
D. none of above D. Input, output and control buses

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 40

209. Data and Instructions in use are stored in 214. Solid state drives have no moving parts
the and use what memory cells to store the
data?
A. Processor
B. Embedded System A. NAND

C. Hard Disk Drive B. AND

D. Main Memory C. NAN


D. EXOR

NARAYAN CHANGDER
210. It is responsible for the execution of in-
structions, controls and system coordina- 215. Used to store the results of calculations
tion. while they are in progress
A. CPU A. Arithmetic and Logic Unit
B. Main Memory
B. Program Counter
C. Input devices
C. Current Instruction Register
D. Output devices
D. Accumulator
E. Bus
E. Memory Data Register
211. What is the purpose of the accumulator?
(4-6) 216. Data is transferred through this.

A. To perform arithmetic operations A. CPU

B. To hold the results of a calculation B. Main Memory

C. To hold the accumulation of instruc- C. Input devices


tions that have happened D. Output devices
D. none of above E. Bus
212. cWhat part of the CPU is being de-
217. The PROM is more effective than ROM
scribed.Executes instructions and controls
chips in regard to
the flow of data
A. Cost
A. ALU
B. Memory management
B. Control Unit
C. Cache C. Speed of operation

D. none of above D. Both Cost and Speed of operation

213. Which registers can interact with the sec- 218. Where would the operation “AND” be
ondary storage? performed?
A. MAR A. Arithmetic Logic Unit
B. PC B. Accumulator
C. IR C. Cache
D. R0 D. Control Unit

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 41

219. If the processing speed goes from 1GHZ C. Bytes


to 4GHZ and the processor is changed D. Seconds
from an 8 core to a dual core processor-

PRACTICE BOOK» NOT FOR SALE


what is the exact effect on the perfor- 224. The third stage of the Fetch-Decode-
mance of the computer? (5-6) Execute cycle is:
A. The number of instructions executed A. The next instruction is fetched from
per second doubles the RAM
B. The number of instructions executed B. The instruction is decoded so that it
per second quadruples can be done
C. The number of instructions executed C. Any processing is done using the ALU
per second is halved D. The PC is incremented
D. The number of instructions executed
per second stays the same 225. What can effect the running of the CPU?
A. How much RAM there is
220. What is transferred down the data bus?
B. How quick the programs are
(4-6)
C. How big the hard drive is
A. Data only
D. What hardware is attached
B. Addresses only
C. Data and Instructions 226. During the transfer of data between the
processor and memory we use
D. Data, Instructions and Addresses
A. Cache
221. It is the design of computer components B. TLB
in hardware being used, in the flow of
data input-process-storage-output within C. Buffers
the system, in algorithms being imple- D. Registers
mented, and more.
227. Data is written to and read from the disk
A. Architecture via a magnetic head mechanism in the
B. Organization floppy drive.
C. Structure A. cylinder
D. Platform B. read/write
C. recordable
222. Which Register is the first to be accessed
during the Fetch-Decode-Execute cycle? D. cluster
A. PC 228. which is a form of permanent memory
B. MAR that holds all the instructions the computer
needs to start up and does not get erased
C. MDR
when the power is turned off.
D. CIR
A. RAM
223. Processors have a speed measured in B. The Network Interface Card (NIC)
A. Hertz C. The CUP
B. Bits D. ROM

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 42

229. The Accumulator is a type of what? 235. Select the best description of an embed-
A. Register ded system
A. A general purpose computing system,
B. Buffer
traditionally with more ROM than RAM.
C. RAM
B. A computing system with a specific
D. Cache purpose, traditionally with more RAM than
ROM.
230. This sends signals such as “I/O Read
C. A computing system with a specific

NARAYAN CHANGDER
A. Control Unit purpose, traditionally with more ROM
B. Arithmetic Logic Unit than RAM.
C. Cache D. A general purpose computing system,
traditionally with more RAM than ROM.
D. Accumulator
236. The main virtue for using single Bus struc-
231. The computer uses the to start the
ture is
computer and launch the operating system
A. Fast data transfers
A. RAM
B. Cost effective connectivity and speed
B. BIOS
C. Cost effective connectivity and ease of
C. HDD attaching peripheral devices
D. DVD D. None of the mentioned
232. When something is loaded from memory 237. BCD stands for
where to you store the memory address?
A. Binary Coded Decimal
A. The CIR
B. Binary Coded Decoder
B. The MAR C. Bit coded data
C. The MDR D. None of these
D. The ALU
238. is the brain of the computer and af-
233. Which is not a register of the Von Neu- fects the overall performance fo the com-
mann architecture? puter
A. Control Unit A. CPU
B. Program counter B. Hard Disk
C. Accumulator C. RAM

D. Memory address register (MAR) D. ROM


239. General purpose registers in the proces-
234. It is a unique file identifier and may be
sor are used for
named by a human or a compute
A. storing data for arithmetic, logical or
A. File Name
shift operations
B. File Extension
B. storing data permanently
C. File Extension Icon C. storing output from the data bus, after
D. File Association being processed

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 43

D. general purpose processing 245. It consists of systems and application


programs that define the instructions ex-
240. A user-generated interrupt (e.g. mov- ecuted by the hardware.

PRACTICE BOOK» NOT FOR SALE


ing a mouse) would be given a higher one
of these to ensure that the user interface A. Data
does not lag in being updated: B. Software
A. priority C. Hardware
B. service D. Peopleware
C. frequency 246. In a computer system, secondary storage
D. none of above is known as such becasue

241. Firmware in which software and hard- A. It is not directly connected to the CPU
ware are integrated on a circuit board is B. It is connected via the primary RAM
often used in what type of system? (5-6) C. It has an additional secondary data
A. Desktop System bus
B. Embedded System D. it makes a copy of the primary storage
C. Operating System 247. Quad CPU
D. Point of Sales System A. Four cores inside a double CPU
242. How many cycles per second would a 3 B. Four cores inside a single CPU
GHz processor do? C. Two cores inside a single CPU
A. 3 million D. one core inside a single CPU
B. 3000
248. What is Cache memory?
C. 3 thousand million (3 billion)
A. memory that is stored on Hard Disk.
D. none of above
B. very fast memory inside the CPU.
243. What happens if you increase the number C. Random Access Memory
of cores
D. none of above
A. CPU can process instructions quicker
B. CPU can process more instructions at 249. The second stage of the Fetch-Decode-
the same time Execute cycle is:

C. CPU will explode A. The next instruction is fetched from


the RAM
D. none of above
B. The instruction is decoded so that it
244. Select ALL the components that make up can be made ready to execute
a CPU C. Any processing is done using the ALU
A. Clock D. The PC is incremented
B. Hard Disk Drive
250. A CPU which is able to carry out a
C. Cache thousand million instructions per seconds
D. ALU would have a clock speed of
E. Motherboard A. 10GHz

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 44

B. 1GHz 256. What should I add to increase the perfor-


C. 100MHz mance of my computer?
D. 1000GHz A. a faster battery
B. add more ROM
251. Either stores the address from which
data will be fetched from the CPU, or the C. add more RAM
address to which data will be sent and D. add a bigger hard drive
stored.
257. If the number of cores goes from dual-

NARAYAN CHANGDER
A. MAR (Memory Address Register) core to quad-core, what effect does this
B. MDR (Memory Data Register) have on performance?
C. CIR (Current Instruction Register) A. Performance decreases
D. PC (Program Counter) B. The maximum number of instructions
E. ALU (Arithmetic and Logic Unit) executed per second doubles
C. The maximum number of instructions
252. The mathematical calculation component
executed per second quadruples
internal to the processor is called the
D. The maximum number of instructions
A. Arithmetic Logic Unit
executed per second halves
B. Calculator
C. Arithmetic Calculus Module 258. With which of the following file systems
can you not rename a file when it’s open?
D. Mathematical Logic System
A. ext3
253. Why are active RFID tags larger than pas- B. ext4
sive tags?
C. XFS
A. They contain a battery
D. NTFS
B. THey are a better design
C. They requrie a larger ariel 259. Add #45, when this instruction is exe-
cuted the following happen/s
D. They are older technology
A. The processor raises an error and re-
254. Which of the following is NOT an operat- quests for one more operand
ing system?
B. The value stored in memory location
A. Windows 45 is retrieved and one more operand is
B. IOS requested
C. Android C. The value 45 gets added to the value
D. Adobe Photoshop on the stack and is pushed onto the stack
D. None of the mentioned
255. The ultimate goal of a compiler is to
A. Reduce the clock cycles for a program- 260. These are images made up of graphical
ming task shapes that can be defined geometrically.
B. Reduce the size of the object code A. Bitmap objects
C. Be versatile B. Graphical objects
D. Be able to detect even the smallest of C. 3D objects
errors D. Objects

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 45

261. If the processing speed goes up from C. MDR


1GHZ to 4GHZ-what is the exact effect on D. MAR
the performance of the computer? (1-4)

PRACTICE BOOK» NOT FOR SALE


A. The maximum number of instructions 266. The instruction, Add #45, R1 does
executed per second doubles A. Adds the value of 45 to the address of
B. The maximum number of instructions R1 and stores 45 in that address
executed per second quadruples B. Adds 45 to the value of R1 and stores
C. The maximum number of instructions it in R1
executed per second is halved C. Finds the memory location 45 and adds
that content to that of R1
D. The maximum number of instructions
executed per second is quartered D. None of the mentioned

262. Information used by the CPU is loaded 267. The two phases of executing an instruc-
first in tion are
A. ROM A. Instruction decoding and storage
B. RAM B. Instruction fetch and instruction exe-
cution
C. CMOS
C. Instruction execution and storage
D. Register
D. Instruction fetch and Instruction pro-
263. Dual-Core processors: cessing
A. Manage twice the instructions every 268. The registers
second
A. do any maths or logic problems for the
B. Manage four times the instructions ev- CPU
ery second
B. store data inside the CPU
C. Manage half the instructions every
second C. send out control signals for the CPU

D. Manage the same amount of instruc- D. hold specific data for the fetch-decode-
tions as a quad-core processor. execute cycle

269. Which of the following is a job of the con-


264. A nonvolatile type of memory that can be
trol unit?
programmed and erased in sectors, rather
than one byte at a time is. A. To start up the computer
A. Flash Memory B. To manage the fetch decode execute
cycle
B. MPROM
C. To create presentations
C. EPROM
D. To carry out calcul
D. EEPROM
270. If the processing speed goes from 1GHz
265. Which part of the CPU is responsible for to 4GHz, what effect does this have on
all the calculations? performance?
A. Control Unit A. The maximum number of instructions
B. Arithmetic Logic Unit executed per second doubles

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 46

B. The maximum number of instructions B. EBCDIC


executed per second quadruples C. ANCI
C. The maximum number of instructions D. USCII
executed per second halves
D. The maximum number of instructions 276. Which of the following bus systems is
executed per second quarters used to designate the source or destination
of the data on the bus itself?
271. The data bus is
A. control bus

NARAYAN CHANGDER
A. A bi-directional path between internal
B. data bus
components
C. address bus
B. A uni-directional path between inter-
nal components D. system bus
C. A tri-directional path between internal 277. When the CPU fetches data it makes use
components of a vital path called?
D. A bi-directional buffer between inter- A. The Address walk
nal components
B. The Address Bus
272. Your friend Michel just purchased a C. The bus
Chromebook and wants to know where his
files are stored. What do you tell him? D. The address plane
A. On the hard drive 278. This is a secondary storage:(1-4)
B. In the system RAM A. CPU
C. In the cloud B. GPU
D. Chromebooks do not store files C. USB
273. The combination of Linux-based files that D. RAM
gets released as a product is called what?
279. The first stage of the Fetch-Decode-
A. Distribution Execute cycle is:
B. Version A. The next instruction is fetched from
C. Kernel the memory
D. Source B. The instruction is decoded so that it
can be done
274. What chips are you to implement Cache
memory? C. Any processing is done using the ALU
A. SRAM D. The PC is incremented
B. DRAM 280. The instruction, Add R1, R2, R3 in RTN is
C. ARAM
D. LRAM A. R3=R1+R2+R3

275. The 8-bit encoding format used to store B. R3<-[R1]+[R2]+[R3]


data in a computer is C. R3=[R1]+[R2]
A. ASCII D. R3<-[R1]+[R2]

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 47

281. Which type of ROM can be erased by UV B. General Purpose Register


light? C. Input Device

PRACTICE BOOK» NOT FOR SALE


A. ROM D. PC (Program Counter)
B. mask ROM E. Output Device
C. EPROM
286. Select two internal computer hardware
D. EEPROM components
282. This would perform an operation includ- A. Address, control and data bus
ing the word “And” B. I/O controllers
A. Arithmetic Logic Unit C. USB ports
B. Control Unit D. The user interface
C. Cache 287. RTN stands for
D. Accumulator A. Register Transfer Notation
283. Which registers hold an address? B. Register Transmission Notation
A. Program Counter C. Regular Transmission Notation

B. Arithmetic Logic Unit D. Regular Transfer Notation

C. Memory Data Register (MDR) 288. Which storage device stores data using
magnetic technology?
D. Accumulator
A. Solid state
E. Memory Address Register (MAR)
B. Internal Hard disk
284. Cache C. USB
A. A small piece of memory within the D. External hard disk
CPU that remembers the most recent in-
structions. 289. Read the statement below and select the
B. A small piece of memory in the RAM correct response.This is used as extra stor-
(Random Access memory that keeps the age when the main memory ( RAM ) is full.
most recent instructions at the front of the A. Level 1 Cache
queue for processing. B. ROM
C. A small piece of memory that remem- C. Level 2 Cache
bers lots of different instructions from all
D. Virtual Memory
of the programs you run. This means the
startup time for your computer will pro- 290. What is ‘cache’?
gressively get quicker.
A. It stores program operations and data
D. A small piece of memory in the Hard while a program is being executed
Disk Drive that supports the fast action of
B. It executes programs using the fetch-
the CPU.
decode-execute cycle
285. Which of these ARE NOT parts of the C. It is a small amount of memory which
CPU? (select as many as appropriate) is a part of the CPU
A. Accumulator D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 48

291. The decoded instruction is stored in 296. The Program Counter


A. IR A. Stores the address of the next instruc-
tion in memory
B. PC
B. Stores the address of where the next
C. Registers item will be fetched from
D. MDR C. Stores data fetched from memory, or
waiting to be stored in memory
292. It is the fundamental representation of

NARAYAN CHANGDER
facts and observations. D. Stores the result of arithmetic calcula-
tions
A. Information
297. How many gates would be required to
B. Data implement the following Boolean expres-
C. Software sion before simplification? XY + X(X + Z)
+ Y(X + Z)
D. Hardware
A. 1
293. Which register which holds the actual B. 2
data or instruction fetched from memory
C. 4
or waiting to be written to memory?
D. 5
A. Program counter
B. Accumulator 298. When Performing a looping operation,
the instruction gets stored in the
C. Memory address register (MAR)
A. Registers
D. Memory data register (MDR)
B. Cache
294. This register contains the address (loca- C. System Heap
tion) of the instruction being executed at D. System stack
the current time
299. Shields computer from harm
A. MAR (Memory Address Register)
A. email virus
B. MDR (Memory Data Register)
B. Software virus
C. CIR (Current Instruction Register)
C. Trojan horse
D. PC (Program Counter)
D. Anti-virus software
E. ALU (Arithmetic and Logic Unit)
300. Processors can’t
295. This holds the instruction/data temporar- A. Process data
ily after it is brought to the processor from
B. Execute instructions
the main memory
C. Execute data
A. Memory Address Register
D. Operate in Hz
B. Memory Data Register
301. addressing mode is most suitable to
C. Accumulator
change the normal sequence of execution
D. Program Counter of instructions.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 49

A. Relative 307. The output that is obtained, on the screen


B. Indirect is called as
A. VDU

PRACTICE BOOK» NOT FOR SALE


C. Index with Offset
B. Hard copy
D. Immediate
C. Soft copy
302. What is RISC? D. None of the above
A. Risk Instruction Set Computing 308. Which part of the CPU holds the immedi-
B. Reduced Instruction Set Computing ate results of the calculations of the ALU?
C. Rhino in someones car A. Accumulator
D. Ready Instruction Set Computing B. Program Counter
C. Memory Address Register
303. Billions of cycles per second, called
D. Memory Data Register
A. gigahertz (GHz)
309. The part of a processor in which instruc-
B. 64-bit
tions are executed is known as? (1-4)
C. megahertz (MHz) A. Core
D. 32-bit B. Centre
304. This stores all of the files needed for your C. Execution
computer system to run. For example, the D. Instruction Centre
operating system, programs and files.
310. The registers, ALU and the interconnec-
A. CPU tion between them are collectively called
B. RAM as
C. Hard drive A. PROCESS ROUTE

D. ROM B. INFORMATION TRAIL


C. INFORMATION PATH
305. Which addressing mode execute its in-
D. DATA PATH
structions within CPU without the neces-
sity of reference memory for operands? 311. This sends signals such as “Memory
A. Implied Mode write” (5-7)
A. Arithmetic Logic Unit
B. Immediate Mode
B. Accumulator
C. Direct Mode
C. Cache
D. Register Mode
D. Control Unit
306. Data and Instructions in use are stored in 312. are used to overcome the difference
the:(1-4) in data transfer speeds of various devices.
A. Processor A. Speed enhancing circuitry
B. Embedded System B. Bridge circuits
C. Hard Disk Drive C. Multiple Buses
D. Main Memory D. Buffer registers

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 50

313. Which part of the CPU controls the flow 319. What is an embedded system?
of data and instructions.
A. A system that has many processors
A. Arithmetic Logic Unit
B. A computer designed to perform more
B. Control Unit than one task
C. Cache
C. A small computer that forms part of a
D. Registers larger system
314. This would perform an operation includ- D. none of above

NARAYAN CHANGDER
ing the word “And” (5-7)
320. It operates on the assumption that the
A. Arithmetic Logic Unit
user can accept a certain amount of data
B. Accumulator degradation as a trade-off for the savings
C. Cache in a critical resource, such as storage re-
D. Control Unit quirements or data transmission time.
A. Data Comression
315. Name one factor affecting CPU perfor-
mance B. Lossless algorithm
A. cache size C. Lossy algorithm
B. size of the CPU D. Compression algorithm
C. Your name
321. The CPU is attached to the inside the
D. whether or not you have good wifi
computer
316. What is a motherboard? A. RAM
A. the main printed circuit board in
B. Motherboard
general-purpose computers
B. the mother of the board C. Hard Drive
C. another word for CPU D. Secondary Storage Device
D. the keyboard
322. If a processor clock is rated as 1250 mil-
317. Select an example of an embedded sys- lion cycles per second, then its clock period
tem is
A. Smartphone A. 1.9 * 10-10 sec
B. Cruise Control B. 1.6 * 10-9 sec
C. Laptop C. 1.25 * 10-10 sec
D. Computer
D. 8 * 10-10 sec
318. Which registers could hold data?
323. What does MAR stand for?
A. Program Counter
A. Main Address Register
B. Arithmetic Logic Unit
C. Memory Data Register (MDR) B. Memory Address Register
D. Accumulator C. Massive Address Register
E. Memory Address Register (MAR) D. Minimal Age Readable

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 51

324. Linux us defined as a , which is also 329. What is the name given to the memory
the core of an operating system. which works on time sharing principle in
order to create an illusion of infinite mem-

PRACTICE BOOK» NOT FOR SALE


A. Distribution
ory space?
B. Version
A. Register
C. Kernel
B. Primary memory
D. Shell
C. Virtual memory
325. Is this a valid example of the D. Cache memory
Input-Process-Output Model? In-
put:Scanning picture.Process:Editing the 330. What happens in the ‘fetch’ part of the
picture.Output:Printed poster with pic- Fetch Decode Execute Cycle
ture. A. The RAM delivers the instruction.
A. Yes. B. The processor fetches the instruction
B. No. from primary memory.
C. The program counter goes down by
C. I don’t know.
one.
D. none of above
D. none of above
326. The system clock provides
331. What is replicate?
A. the frequency of the CPU operations A. To make copies of itself
B. the time of day B. To open a file
C. the speed the? ? ? C. To create a document
D. ? ? ? D. To make copies from others
327. What does the control unit do? 332. Which component generates addresses(4-
A. It controls and monitors communica- 6)
tions between the computer and any hard- A. Processor
ware attached
B. Main Memory
B. It holds the data and programs that C. Control Unit
the CPU currently needs
D. Secondary Storage
C. It holds the data and programs that
the CPU currently needs 333. Who developed the basic architecture of
D. All of the above computer?
A. Blaise Pascal
328. PCIe provides lower latency and higher
B. Charles Babbage
data transfer rates than busses such
as PCI and PCI-X. C. John Von Neumann
A. serial D. None of the above
B. parallel 334. Logic gates are digital
C. integrated A. .. Switches
D. synchronous B. .. Footprints

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 52

C. .. Binary D. All of the above


D. .. RAM
340. This holds the number of the current in-
335. Which is an example of an Embedded Sys- struction being worked on (7-9)
tem: A. Memory Address Register
A. PCs B. Memory Data Register
B. Washing Machine
C. Program Counter
C. Laptops

NARAYAN CHANGDER
D. Accumulator
D. Tablets
341. The stages required for processing are
336. What is a mnemonic?
known as the
A. A binary machine code instruction
A. Fetch-Execute-decode
B. A memory address
B. Process-decode-fetch
C. A meaningful abbreviation used in as-
sembly language C. Fetch-Decode-Execute
D. none of above D. Process

337. Memory Data Register (MDR) 342. If the instruction, Add R1, R2, R3 is ex-
A. Stores the address of the next instruc- ecuted in a system that is pipe-lined, then
tion in memory the value of S is (Where S is a term of the
Basic performance equation)?
B. Stores the address of where the next
item will be fetched from A. 3
C. Stores data fetched from memory, or B. 2
waiting to be stored in memory C. 1
D. Stores the result of arithmetic calcula-
D. 6
tions
338. Which of the following are examples of 343. are numbers and encoded characters,
volatile storage? generally used as operands.
A. CPU cache and RAM A. Input
B. Hard drive and ROM B. Data
C. Hard drive C. Information
D. RAM D. Stored Values
339. What does the CU do? 344. Hard drives use what substance for mag-
A. controls the flow of data within the netising the bits for the storage of binary
CPU 1 or 0?
B. It controls the input and output of data A. Ferrous particles
so that the signals go to the right place at
B. Nitrous particle
the right time
C. Iodised particles
C. It controls and monitors the hardware
attached to the system D. Silicon particles

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 53

345. One of the dedicated registers in the pro- 350. Which of the following expressions is in
cessor that contains bits that are set and the sum-of-products (SOP) form?
cleared depending on the result of an oper-

PRACTICE BOOK» NOT FOR SALE


A. (A + B)(C + D)
ation is called the
B. (A)B(CD)
A. Status register
C. AB(CD)
B. Setting register
D. AB + CD
C. Super register
351. The instruction, Add Loc, R1 in RTN is
D. Sorting register
A. Add SetCC Loc+R1
346. RAM stands for B. R1=Loc+R1
A. Rapid Access Memory C. Not possible to write in RTN
B. Random Awareness Memory D. R1<-[Loc]+[R1]
C. Rapid Awareness Memory
352. Which register holds instructions/data
D. Random Access Memory temporarily after it is brought to the pro-
cessor from main memory?
347. The computer uses the to store tem-
porary information that is being created A. Memory Address Register
and used by open programs B. Memory Data Register
A. RAM C. Program Counter
B. ROM D. Accumulator
C. Hard Disk 353. These are usually small, low cost, and in-
D. CPU tended for one user or one device.
A. Microcomputers
348. An 24 bit address generates an address
space of locations. B. Minicomputers
A. 1024 C. Mainframes
B. 4096 D. Supercomputers

C. 248 354. What happens at the Decode step of the


D. 16, 777, 216 fetch-decode-execute cycle?
A. The CPU makes sense of the instruc-
349. These are generally used in a multi-user tions.
environment where servers act as a plat-
B. The CPU fetches the information from
form for a specific application, such as a
RAM.
print server that manages all printers and
handles all print tasks or a mail server that C. The instructions are executed.
manages all the organizations’s mail. D. none of above
A. Microcomputers
355. What component holds the address of the
B. Minicomputers next instruction?
C. Supercomputers A. Memory Address Register
D. Supercomputers B. Memory Data Register

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 54

C. Accumulator 361. You just copied a file from the Work di-
D. Program Counter rectory to the Projects directory on your
Windows PC. What happened to the file
356. This doesn’t happen during the Decode / on the hard drive?
Execute part of the cycle:(7-9) A. Nothing
A. Current Instruction is held in the CIR B. The file was removed from the Work
B. Results are held in the Accumulator directory and placed in the Projects direc-
tory

NARAYAN CHANGDER
C. Status Register updated
C. The file was not moved, but a new
D. Instructions are transferred from pointer record was created associating
Main Memory the file with the Project’s directory
357. The processor D. The file was copied to a new location
on the hard drive and was associated with
A. Fetches and decodes instructions
the Project’s directory
B. Is main memory
362. Carries signals relating to the control and
C. Is secondary storage
coordination of all activities within the
D. Is an input device computer.
358. Where is the instruction being followed A. Address bus
by the CPU stored? B. Data bus
A. MAR C. Control bus
B. MDR D. none of above
C. CIR 363. It layers the discrete signal in the analog
D. PC signal with less margin of error.
A. Sampliing
359. Results of calculations are held in this
register:(7-9) B. Quantization
A. Memory Address Register C. Encoding

B. Memory Data Register D. Decoding

C. Program Counter 364. Which secondary device can read/write


D. Accumulator data the fastest?
A. Optical Disk
360. RAM-What happens when the electricity
B. SSD
Is turned off?
C. Magnetic Hard Drive
A. The data from the memory is saved
onto flash memory D. Cloud Storage
B. The data from the memory is saved 365. On which OS would you use the
onto the hard disk Ctrl+Window Switcher key to create a
C. The data from the memory is not saved screen capture?

D. The data from the memory is saved A. Windows


onto ROM B. Linux

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 55

C. Mac OS X 371. The processor (1-4)


D. Chrome OS A. Carries out instructions

PRACTICE BOOK» NOT FOR SALE


B. Is main memory
366. Select the registers . [3]
C. Is secondary storage
A. ALU
D. Is an input device
B. MDR
C. ACC 372. What is the name of the register that
stores the instruction that the CPU is exe-
D. PC cuting at the moment?
E. CU A. Current Instruction Register
367. The System bus is made up of B. Program Counter

A. Control Bus C. Memory Data Register


D. Accumulator
B. Address Bus
C. Both Control bus and Address bus 373. Computers are binary machines, instruc-
tions are, sequences
D. Control bus, Data bus and Address bus
A. Decimal
368. This would reduce the number of mem- B. Binary
ory/processor transfer
C. Images
A. Cache
D. Text
B. Virtual Memory
374. It is a structure that has a predetermined
C. Accumulator
ordering from high to low in which it refers
D. Clock Speed to systems that are organized in the shape
of a pyramid, with each row of objects
369. stores all of your files including linked to objects directly beneath it.
movies, word documents, and music files
A. Computer Hierarchy
A. RAM
B. Computer Chart
B. CPU
C. Computer Pyramid
C. Hard Disk
D. Computer Cone
D. ROM
375. What is a CPU thread?
370. How does clock speed affect computer A. A virtual CPU
performance?
B. How quickly time goes by.
A. The higher the clock speed the slower
C. A CPU core
the computer will run.
D. The speed of the CPU
B. It improves the amount you can store
on the computer. 376. Which of these are REGISTERS in the
C. The higher the clock speed the better CPU? (Tick ALL that are correct)
the performance. A. Accumulator
D. It will make loading program slower B. ALU

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 56

C. Program Counter 381. Single core CPU is


D. Memory Address Register A. One core inside a single CPU that han-
dles all the processing.
E. Control Bus Register
B. Two core inside a single CPU that han-
377. An OR gate can be imagined as dles all the processing.
A. switches connected in series. C. Two core inside a doubleCPU that han-
dles all the processing.
B. switches connected in parallel

NARAYAN CHANGDER
D. None of the above
C. MOS transistors connected in series
D. All of the above 382. What is the purpose of the Memory Data
Register (MDR)?
378. The main circuit board in a computer is A. Holds the location of where the data is
called the to be stored / read from
A. RAM B. Holds memory
B. dongle C. Holds instructions
C. motherboard D. It does nothing
D. power supply unit 383. Which bus is unidirectional?
379. What is the purpose of an ‘operating sys- A. Address bus
tem’? B. Data bus
A. The user has to type in specific com- C. Control bus
mands to do things like moving and copy- D. None of the above
ing files.
B. The user communicates with the oper- 384. What does LRU stand for?
ating system using windows, icons, menu A. Least recently used
and pointers (WIMP) e.g. Windows. B. Last RAM used
C. A set of programs that controls how C. Low required usage
the user interacts with the hardware and
D. not a thing
software of a computer.
D. Allows a user to interact with the com- 385. When a computer is first powered up, the
puter. initiating programs are loaded into mem-
ory from the chip.
380. Memory Address Register (MAR) A. RAM
A. Stores the address of the next instruc- B. ROM
tion in memory
C. Cache
B. Stores the address of where the next
D. none of above
item will be fetched from
C. Stores data fetched from memory, or 386. the names of the 2 computer architecture
waiting to be stored in memory (Choose 2 answers )

D. Stores the result of arithmetic calcula- A. Harvard


tions B. Instruction Set Architecture

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 57

C. Microarchitecture 392. What are the four basic operations of the


D. Von Neumann Fetch Execute Cycle? (choose all applica-
ble)

PRACTICE BOOK» NOT FOR SALE


387. What is cache memory? A. Fetch
A. A very large, temporary memory B. Decode
B. A very small but expensive memory C. Execute
C. It is used to store data and programs D. Store
permanently E. Handshake
D. It is a type of payment
393. Which of the below are registers?
388. Which of the two architecture saves A. Program Counter
memory? B. Arithmetic Logic Unit
A. Harvard C. Memory Data Register (MDR)
B. Von Neumann D. Accumulator
C. Harvard & Von Neumann E. Memory Address Register (MAR)
D. None of the mentioned
394. What is a cache?
389. What is Digital Electronics A. It stores data so that future requests
A. Field of electronics involving the study are quicker
of digital signal B. Not a real thing
B. Engineering of devices that digital sig- C. money spelt wrong
nal D. a processing unit in a CPU
C. Engineering of devices that produce
395. What does the ALU do?
digital signal
A. Logic operations
D. All Of the mentioned
B. Nothing
390. CPU clock speed is measured in C. Deletes calculations
A. Megabytes D. Performs calculations
B. Joules
396. What enables different parts of the CPU
C. bits to work on different tasks at the same
D. Gigahertz time
A. Hyper Threading
391. The is software that supports a com-
B. Multiplier
puter’s basic functions, such as scheduling
tasks and executing applications C. Cores
A. Operating System D. Bus Speed
B. Hard Drive 397. How many Megabytes is a Gigabyte
C. RAM A. 1000mb
D. ROM B. 10, 000mb

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 58

C. 100mb 402. What is the name of the unit that store


instructions and data during the Fetch-
D. 10mb
Execute Cycle?
398. The ROM chips are mainly used to store A. Control unit
B. Registers
A. System files
C. Arithmetic unit
B. Root directories
D. Logic unit

NARAYAN CHANGDER
C. Boot files
403. Processors have a speed measured in (1-
D. Driver files
4)
399. What is the purpose of the CPU A. Hertz
A. To output data on the screen B. Bits
B. To process data and perform calcula- C. Bytes
tion by fetching, decoding and executing D. Seconds
instructions
C. To store data for later use 404. is a technique used to make a proces-
sor work at a faster speed than its original
D. To plug Input and Output devices specification.
400. Where would a signal such as ‘Memory A. overclocking
Read’ be sent from? B. throttling
A. Arithmetic Logic Unit C. super clock
B. Accumulator D. multicore
C. Cache
405. This component will store the data cur-
D. Control Unit rently being used by the computer system.
For example, parts of the operating sys-
401. What is the purpose of the I/O controller tem, opened programs and files.
in the computer?
A. CPU
A. provides the connection between ex-
ternal devices to the processor (via the B. RAM
data bus) C. Hard drive
B. provides the connection between inter- D. ROM
nal devices to the processor (via the data
bus) 406. Which register holds the address of the
C. provides the barrier between external current instruction being worked on?
devices to the processor (via the control A. Memory Address Register
bus)
B. Memory Data Register
D. provides the connection between the
C. Program Counter
internal memory and the processor (via
the address bus) D. Accumulator

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 59

407. What is the location of the internal regis- C. EISA


ters of CPU? D. ISA

PRACTICE BOOK» NOT FOR SALE


A. Internal
413. This component will fetch, decode and ex-
B. On-chip ecute data and instructions.
C. External A. CPU
D. Motherboard B. RAM
408. When using Branching, the usual sequenc- C. Hard drive
ing of the PC is altered. A new instruction D. ROM
is loaded which is called as
414. What is the unit that we use to determine
A. Branch target
the clock speed
B. Loop target
A. GHz
C. Forward target B. GB
D. Jump instruction C. M
409. The addressing mode which makes use of D. Houses
in-direction pointers is
415. It compresses the data in such a way that
A. Indirect addressing mode the application of a matching inverse al-
B. Index addressing mode gorithm restores the compressed data ex-
actly to its original form.
C. Relative addressing mode
A. Lossless algorithm
D. Offset addressing mode
B. Lossy algorithm
410. The CPU cache stores
C. Compression
A. Only instructions D. Compression algorithm
B. Word documents
416. This includes devices that process data
C. Frequently accessed data and instruc- by executing instructions, storing data,
tions without needing to go to RAM and moving data and information be-
D. A list of IP addresses tween various Input/Output devices, mak-
ing the system and information accessible
411. Which of these is NOT a stage of the FDE to users.
cycle?
A. Data
A. Fetch
B. Software
B. Execute
C. Hardware
C. Decide
D. Internet
D. Decode
417. A NOR gate has two or more input sig-
412. is the most common and slowest ex- nals. All input must be to get a high
pansion bus output
A. AGP A. low
B. VESA B. highC

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 60

C. 1’sD 423. Having a processor with higher cache,


D. some low some high more cores or a higher clock speed will re-
sult in
418. What accurately describes a peripheral? A. More programs able to be loaded at
(1-4) the same time.
A. A component of a computer system B. More instructions to be processed at
B. A device that is not directly connected the same time.

NARAYAN CHANGDER
to the CPU C. More data can be saved on your com-
C. A device that is directly connected to puter system.
the CPU D. Programs loading faster
D. A device that is plugged in
424. Machine code was the fitst coding lan-
419. How many instructions per second can a guage used, this next progressed to using
CPU with a clock speed of 2.5 GHZ pro-
A. mnemonics
cess?
B. pseudocode
A. 2.5 million
C. high-level languages
B. 2.5 billion
C. 3 billion D. flowcharts

D. 5 trillion 425. The area of the CPU which stores regu-


larly used data is known as
420. In the CPU, this is a register which stores
the intermediate results of the ALU. A. The clock speed

A. Program counter B. The number of cores


B. Accumulator C. The cache
C. Memory address register (MAR) D. The RAM
D. Memory data register (MDR) 426. It is the best known compressed alterna-
tive to GIF.
421. How many bits are in a single byte?
A. 4 A. Graphical Interchange Format

B. 8 B. Portable Network Graphics

C. 12 C. Joint Photographer Expert Group

D. 16 D. Photographer Network Graphics

422. AMD processors use to enhance CPU 427. Which of the following is the correct or-
performance. der for clock speed measurements?
A. Front Side Bus A. Hz, KHz, MHz, GHz
B. Bit B. Hz, KHz, GHz, MHz
C. None of the above C. Hz, GHz, MHz, KHz
D. HyperTransport D. GHz, Hz, KHz, MHz

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 61

428. Which Register would be first to be ac- B. Joystick


cessed during the Fetch-Decode-Execute C. Keyboard
cycle?

PRACTICE BOOK» NOT FOR SALE


D. flash drive
A. PC
B. MAR 434. Which register holds the memory address
about to be used by the CPU?
C. MDR
A. Program counter
D. CIR
B. Accumulator
429. The control unit controls other units by
C. Memory address register (MAR)
generating
D. Memory data register (MDR)
A. Control signals
B. Timing signals 435. An embedded system is one that is..
C. Transfer signals A. built into a larger system and can be
easily reprogrammed
D. Command Signals
B. the main system but cannot be repro-
430. The time delay between two successive grammed
initiations of memory operation
C. the main system and can easily be re-
A. Memory access time porgrammed
B. Memory search time D. built into a larger system and has only
C. Memory cycle time limited functions. It takes an input, pro-
D. Instruction delay cesses and delivers an output.

431. Which of the following is not a way to 436. People are;


open the Start menu on a Windows-based A. instructions that control processing
computer? B. individual facts input into a system
A. Ctrl+S C. software not fully understood by most
B. Ctrl+Esc users
C. Click the Start button D. users of a system
D. Press the Start key on the keyboard
437. The O in ROM stands for
432. Which is an example of an Embedded A. One
System:(1-4)
B. Open
A. Laptops
C. Only
B. Tablets
D. Often
C. PCs
438. Typical processor speed of 2016:(1-4)
D. Washing Machine
A. 16Hz
433. It is one of the primary input devices com-
posed of buttons with alphanumeric char- B. 100MHz
acters. C. 4GHz
A. Mouse D. 300GHz

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 62

439. How can BlueRay disks hold more data C. 145 microseconds
than CD or DVD disks? D. 158.4 microseconds
A. the frequency of light used is higher,
444. What is a system bus?
hence smaller pits are created
A. A circuit that connect one part of CPU
B. the frequency of light used is lower,
to other components.
hence smaller pits are created
B. A type of long term memory
C. the frequency of light used is lower,
C. A type of permanent memory

NARAYAN CHANGDER
hence largr pits are created
D. The disks are larger and contain more D. A type of public transport that’s always
material late

440. You need to prepare a brand-new replace- 445. The correct order is
ment hard drive for storage. What is the A. Fetch, Decode, Execute
first step needed to get it ready? B. Decode, Execute, Fetch
A. Format the drive C. Execute, Decode, Fetch
B. Install an OS D. Decode, Fetch, Execute
C. Install a file system
446. Computer use addressing mode tech-
D. Create a partition niques for
441. It pertains to the placement of data from A. Giving programming versatility to the
one memory location to the other. user by providing facilities as pointers to
memory control for loop control
A. Data transformation or translation
B. to reduce the number of bits in the field
B. Data sorting
of instruction
C. Data storage and retrieval
C. specifying rules for interpreting ad-
D. Data movement dress field of the instruction
442. The memory implemented using the semi- D. all the above mentioned
conductor chips is 447. Select the registers which hold memory
A. Cache addresses . [2]
B. Main A. RAM
C. Secondary B. MDR
D. Registers C. ACC
D. PC
443. A four stage pipeline has the stage de-
lays as 150, 120, 160 and 140 ns re- E. MAR
spectively. Registers are used between
448. What is the part of the CPU called that
the stages and have a delay of 5 ns each.
performs calculations?
Assuming constant clocking rate, the total
time taken to process 1000 data items on A. ALU
the pipeline will be- B. Control Unit
A. 130.4 microseconds C. Program Counter
B. 165.5 microseconds D. Memory

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer-System Architecture 63

449. Inside the CPU, you will find: D. CPU/Main memory/Secondary stor-
A. ALU, CU, registers, cache memory age

PRACTICE BOOK» NOT FOR SALE


B. ADU, PC, storage, RAM memory 455. This would perform an operation such as
C. ARM, PC, controller, cache memory 5+8 (1-4)
D. APM, CU, time signal, RAM memory A. Arithmetic Logic Unit

450. In the following indexed addressing B. Accumulator


mode instruction, MOV 5(R1), LOC the ef- C. Cache
fective address is
D. Control Unit
A. EA = 5+R1
B. EA = R1 456. What is a graphics card?
C. EA = [R1] A. A monitor
D. EA = 5+[R1] B. Speeds up processor

451. Which memory device is generally made C. Its a card that shows pixels on a mon-
of semiconductors? itor
A. RAM D. A piece a junk
B. HARD DISK
457. What does “Secure” means?
C. FLOPPY DISK
A. Protected from danger or harm
D. CD DISK
B. Protested by danger or harm
452. What register do you store the data in? C. Presented with danger or harm
A. CPU
D. Provide information about computer
B. The MAR data
C. The MDR
458. An optimizing Compiler does
D. ALU
A. Better compilation of the given piece
453. Which of the following can affect the per- of code
formance of a CPU?
B. Takes advantage of the type of proces-
A. Cache size sor and reduces its process time
B. Number of cores C. Does better memory management
C. Clock Speed D. None of the mentioned
D. All of the above
459. Which component is the Von Neumann De-
454. The main computer components are:(1-4) sign concerned with?
A. Input/Output/CPU/Main memory A. The CPU and RAM
B. CPU/Main memory/Secondary stor-
B. The CPU
age
C. The RAM
C. Input/Output/CPU/Main mem-
ory/Secondary storage D. Secondary storage

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Operating-System Structure 64

460. The standard SRAM chips are costly as A. Controls the flow of data around the
CPU and also decodes instructions
A. They use highly advanced micro- B. Only controls the flow of data around
electronic devices the CPU
B. They house 6 transistor per chip C. Only decodes instructions
C. They require specially designed PCB’s D. Controls how much power is directed
to all components within the computer
D. None of the mentioned

NARAYAN CHANGDER
464. The instruction → Add LOCA, R0 does
461. I am the long-term storage part of the
computer. Software, documents and other
files are saved here. A. Adds the value of LOCA to R0 and
stores in the temp register
A. random access memory (RAM)
B. Adds the value of R0 to the address of
B. hard drive LOCA
C. motherboard C. Adds the values of both LOCA and R0
D. expansion slot and stores it in R0
D. Adds the value of LOCA with a value in
462. Which of the following would not be con- accumulator and stores it in R0
sidered metadata for a spreadsheet file?
A. Read-only attribute 465. Which of the following is the fastest clock
speed?
B. Calculation inside the file
A. 900MHz
C. Name of the file
B. 2.4GHz
D. Full size
C. 5000KHz
463. The control unit D. 1, 000, 000, 000Hz

1.4 Operating-System Structure


1. Which of the following are the types of D. none of above
Path names?
3. Which one of the following is the deadlock
A. absolute & relative
avoidance algorithm?
B. local & global
A. karn’s algorithm
C. global & relative
B. elevator algorithm
D. relative & local
C. round-robin algorithm
2. When two users keep the same subdirec-
tory in their own directories, the structure D. banker’s algorithm
being referred to is
4. What will happen in the single level direc-
A. tree structure tory?
B. two level directory structure A. All files are contained in the same di-
C. acyclic graph directory rectory

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Operating-System Structure 65

B. All files are contained in different di- C. Stack directory structure


rectories all at the same level D. Tree directory structure

PRACTICE BOOK» NOT FOR SALE


C. Depends on the operating system
10. The total time to prepare a disk drive
D. none of above mechanism for a block of data to be read
from it is
5. What does the additional function “Re-
source allocation” do? A. latency
A. Pass parameters between a running B. latency plus transmission time
program and the operating system C. latency plus seek time
B. Keep track of and record kinds of com- D. latency plus seek time plus transmis-
puter resources sion time
C. Ensure correct computing by detecting 11. A system is in the safe state if
errors in the CPU
A. a process may hold allocated re-
D. Distributes resources to multiple sources while awaiting assignment of
users running at the same time. other resources
6. Which two of the followings is considered B. the system can allocate resources to
as “Operating System Services”? each process in some order and still avoid
a deadlock
A. Protection and Security
C. none of the mentioned A system is in
B. Error Detection
the safe state if
C. File-System Manipulation
D. none of above
D. Accounting
12. To create a file
7. In a magnetic disk, data is recorded in a set A. allocate the space in file system
of concentric tracks which are subdivided
into B. make an entry for new file in directory
C. allocate the space in file system &
A. periods
make an entry for new file in directory
B. sectors
D. none of above
C. zones
13. A file is a/an data type.
D. groups
A. abstract
8. File attributes consist of B. primitive
A. name C. public
B. type D. private
C. identifier
14. Every address generated by the CPU is di-
D. all of the mentioned vided into two parts. They are
9. Which of the following is not a type of di- A. frame bit & page number
rectory structure? B. page offset & frame bit
A. Acyclic-graph directory structure C. page number & page offset
B. Single-level directory structure D. frame offset & page offset

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Operating-System Structure 66

15. Which one of the following is one the ben- C. System Seek Time First
efits of a Microkernel Organizaton? D. System Shortest Time First
A. Portability
21. Which of the following is a condition that
B. Safety
causes deadlock?
C. Privacy
A. Mutual exclusion
D. Productivity
B. Hold and wait
16. What is “Layered Approach”?

NARAYAN CHANGDER
C. Circular wait
A. A number of layers D. No preemption
B. The interaction of the layers E. All of these
C. A small operating system core
22. Which method is considered one of the gen-
D. A networked computer system. eral methods to pass parameters?
17. In which of the storage placement strate- A. Exchange information on the same
gies a program is placed in the largest computer
available hole in the main memory?
B. Pass the parameters in registers
A. best fit
C. Allocating resources to multiple jobs
B. first fit running at the same time.
C. worst fit D. Interrupts computer after specified
D. buddy period

18. Which two of the followings are consid- 23. What is the Advantage and Disadvantages
ered as types of System Calls? of “Layered Approach”?
A. Information maintenance A. Simplicity of construction and debug-
B. File-system manipulation ging and less efficient

C. Protection and security B. Maintainability and cost


D. Process control C. Convenience and economical
D. Computation speed up and financial
19. What is the user goals of an Operating
loss
System?
A. Convenient to use, easy to learn, reli- 24. Which of the following is true about Micro-
able, safe and fast kernel?
B. Easy to design, implement and main- A. Executes the instructions in the user
tain program until it encounters an ending or
error condition
C. flexible, reliable, error-free and effi-
cient B. Able to load a program into memory
D. Speed, cost and volatility and to run that program
C. Contains only essential core operating
20. SSTF stands for systems functions
A. Shortest Signal Time First D. controls the execution of application
B. Shortest Seek Time First programs

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


PRACTICE BOOK» NOT FOR SALE
2. Operating-System Structures

2.1 User and Operating-System Interface


1. When you delete a file in your computer, 4. All of the following are software inter-
where does it go? faces, except:
A. Recycle bin A. Command line
B. Hard disk B. Graphical User Interface

C. Taskbar C. Menu
D. Icons
D. None of these
5. This moves around the screen and helps
2. What type of user interfaces are com- you select text on the screen:
monly used in many self-service kiosks?
A. Pointers
A. GUI
B. Windows
B. Command Line C. Menu
C. Menu-Based D. Icons
D. Turn-Based
6. What type of images are often used on
the web for complex images that require
3. This is a compressed format that has a 24-
transparency?
bit colour depth, it uses lossy compression
to reduce the number of colours being used, A. SVG
thus reducing the file size. Excellent image B. PNG
quality and suitable for use on the web.
C. JPG
A. BMP D. GIF
B. JPG
7. A disadvantage of a Graphical User Inter-
C. GIF face is
D. Vector A. That it is hard to learn

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.1 User and Operating-System Interface 68

B. There are no accessibility options. 13. What is the maximum length of a filename
C. It takes longer to load than other inter- in DOS?
faces A. 4
D. It can not be modified by the user B. 8
8. Which user interface makes use of WIMP? C. 5
A. Command Line Interface D. 12

NARAYAN CHANGDER
B. Graphical User Interface
C. Menu Interface 14. What does F12 do?

D. Touch Interface A. Save


B. Undo
9. Over time your hard disk becomes frag-
mented. This means that the data that C. Refresh
makes up your files & applications are split
in different locations across your hard disk. D. Nothing
When you try to load files, what might
happen? 15. Which of the following is the extension of
a notepad .
A. It is harder for the OS to find the files
A. .Txt
B. It is easier for the OS to find the files
C. Loading times slow down B. .ppt

D. Loading times speed up C. .bmp


D. none of above
10. The shortcut to paste something is
A. Ctrl + S 16. Amazon Alexa is an example of which type
B. Ctrl + V of interface?
C. Ctrl + P A. Speech and sound
D. Ctrl + C B. Command Line
11. Banker’s algorithm is used? C. GUI
A. To prevent deadlock D. Menu
B. To deadlock recovery
17. What is one advantage of a Command Line
C. To solve the deadlock
Interface?
D. None of these
A. It uses less processing power, so is
12. What is the mean of the Booting in the op- quicker
erating system? B. It is easy for a beginner to use
A. Restarting computer
C. It is accessible to people with visual
B. Install the program disabilities
C. To scan D. There are a lot of accessibility func-
D. To turn off tions

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.1 User and Operating-System Interface 69

18. This is an uncompressed format that has a 23. We see real-time operating systems
24-bit colour depth. Because file sizes are mostly used in
so large they are rarely used in internet

PRACTICE BOOK» NOT FOR SALE


A. School Computers
applications like the web
B. Home Computers
A. Vector
C. Portable Devices
B. JPG
D. Embedded Devices
C. BMP
24. Which type of user interface is most suit-
D. GIF able to somebody with a visual impair-
ment
19. The shortcut to print something is
A. Graphical User Interface
A. Ctrl + S
B. Speech and Sound Interface
B. Ctrl + V
C. Command Line Interface
C. Ctrl + P D. Menu Interface
D. Ctrl + C
25. The shortcut to copy something is
20. BIOS is used? A. Ctrl + S
A. By operating system B. Ctrl + V
B. By compiler C. Ctrl + P
C. By interpreter D. Ctrl + C

D. By application software 26. What does WIMP stand for?


A. Windows, Icons, Mouse pointers
21. Powerful servers, supercomputers and
mainframes make use of ? B. Windows, Images, Menus, Pointers

A. Single-User, Multi-Tasking Operating C. Windows, Images, Mouse pointers


Systems D. Windows, Icons, Menus, Pointers
B. Real-Time Operating Systems 27. What are TWO advantages of a Graphical
C. Multi-User Operating Systems User Interface?

D. Single-User, Multi-Tasking Operating A. It uses less processing power, so is


Systems quicker
B. It is easy for a beginner to use
22. This is a compressed format that has an
C. It does not take up a lot of memory on
8-bit colour depth. This means it can only
a device harddrive
display 256 different colours. Uses Loss-
less compression D. There are a lot of accessibility func-
tions
A. BMP
28. Which term is used to describe the fact
B. JPG
that software should be able to be used
C. GIF by ALL types of users?
D. Vector A. Accessibility

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.1 User and Operating-System Interface 70

B. Useability 34. This type of operating system monitors ex-


C. Optimisation ternal events and processes data as soon
as it enters the computer system. This al-
D. none of above lows the computer system to respond im-
mediately to the input.
29. What is an example of a GUI
A. single-user, single-task
A. Microsoft Windows OS
B. single-User, multi-Tasking
B. Apple Mac OS

NARAYAN CHANGDER
C. real-time operating systems
C. Android OS
D. All the above D. multi-user operating system

30. A GUI uses all of the following except 35. GUI stands for
A. pointers A. Grafical user intrface
B. icons B. Graphics united interface
C. Windows C. Graphical User Interface
D. complex instructions D. none of above

31. Which term is used to describe software 36. Single-User, Multi-Tasking Operating Sys-
that does not crash easily with unexpected tems. We commonly see this type of oper-
input? ating system used ?
A. Fit for purpose A. In smartphones
B. Reliable B. In embedded devices
C. Robust C. personal computers
D. Efficient D. traffic lights
32. Where the operating system is having
37. is the most important system soft-
to constantly switch data between main
ware that runs on a computer.
memory and virtual memory, it is called
? A. Operating System
A. Thrashing B. GUI
B. Threshing C. CLI
C. Spinning D. none of above
D. Booting
38. Which of the following tells the disadvan-
33. Which type of users would benefit from a tages of GUI
braille keyboard? A. Takes up more memory
A. Novice B. Requires an operating system to oper-
B. Blind ate
C. Expert C. User need to learn commands
D. Old D. The interface is easier to use

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.1 User and Operating-System Interface 71

39. When was there first operation systems 44. What is responsible for assigning memory
developed? to each of your applications running in or-
der to allow them to run.

PRACTICE BOOK» NOT FOR SALE


A. 1948
A. Harware
B. 1951
B. Operating System
C. 1950
C. Microsoft Office
D. 1949
D. The RAM
40. This is a list of options from which you can
choose what you want to do: 45. Much of your networking capabilities, in-
cluding connecting to the internet, is con-
A. Command line
trolled and managed by..?
B. Graphical User Interface
A. the operating system
C. Menu
B. the wires
D. Icons
C. wireless capability
41. What is the full name of FAT? D. the hardware
A. File attribute table
46. What else is a command interpreter
B. File allocation table called?
C. Font attribute table A. Prompt
D. Format allocation table B. Kernel

42. Which term is used to display warnings C. Shell


before the user performs a potentially de- D. Command
structive action:
47. How can the usability of a program be im-
A. warnings and error messages
proved when typing in a birth date?
B. consistency
A. Validate that the entered numbers are
C. readability in the correct range
D. navigation B. Use a date picker

43. What is hardware? C. Validate that only numbers are en-


tered
A. The physical components in a com-
puter; like the RAM, CPU and Hard Drive D. none of above

B. The programs that run on our comput- 48. Which of the following is not an operating
ers; like Chrome, Microsoft word and Spo- system?
tify
A. Linux
C. The name given to explain differ-
B. Window
ent types of computer; Desktop, Laptop,
Smartphone, Etc. C. Oracle
D. none of above D. Dos

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.1 User and Operating-System Interface 72

49. The part of a screen that holds its own doc- C. Takes up a lot of processing power and
ument or message. memory
A. Pointers D. none of above
B. Windows 55. Your operating system is responsible for
C. Menu allowing peripheral devices to input and
D. Icons output data to the computer system. In
order to do this, it uses ?
50. A poorly performing operating system can

NARAYAN CHANGDER
A. Drivers
be extremely frustrating because ?
B. Devices
A. Slow boot-up times
C. Drivers Device
B. Poor application & file loading
D. Device Drivers
C. Crashing or freezing
D. Delay in saving files 56. Windows 10 is able to alter its look
and options for running on smartphone,
51. TCP/IP are the protocols that are funda- tablet or personal computer because it is
mental in allowing us to ? a what?
A. connect to the internet A. Adapted Interface
B. run anti-virus software B. Adaptable Interface
C. send email C. User-Interface
D. transmit data over a network D. Multi-Tasking Interface
52. What is the full name of the IDL? 57. This interface requires you to type in a
A. Interface definition language command.
B. Interface direct language A. Command line
C. Interface data library B. Graphical User Interface
D. None of these C. Menu
D. Icons
53. Microsoft Windows and Mac OSX are very
familiar to us. But what type of O/S are 58. is a commonly used operating system.
they?
A. Windows
A. Real-time Operating System
B. MS Word
B. Single-user, multi-tasking
C. Paint
C. Single-user, single-task
D. none of above
D. Multi-user operating system Microsoft
Windows and Mac OSX are very familiar 59. When were MS Windows operating sys-
to us. But what type of O/S are they? tem proposed?

54. Choose an advantage for the Graphical A. 1994


User Interface. B. 1992
A. Avoids displaying detailed information. C. 1985
B. Simple to use for beginners D. 1990

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 73

60. The operating system assigning applica- B. allocating


tions to “virtual memory” is known as? C. paging

PRACTICE BOOK» NOT FOR SALE


A. filing D. texting

2.2 System Software


1. When you purchase a personal computer, C. Keeps processes together in RAM
it usually has system software installed on D. Places processes wherever there is
its hard disk. space in RAM
A. True E. Can cause stack overflow
B. False
6. Interpreter is used as a translator for
C. Not Sure
A. Low level language
D. none of above
B. High Level Language
2. The name of the interface used by blind C. Internet language
persons to perform operations on a com-
puter is D. C
A. sensor 7. Proprietary operating system for comput-
B. icon ers made by Apple Corporation.
C. braille A. Windows
D. touch screen B. MAC OS
C. UNIX
3. What are the most popular operating sys-
tems? D. LINUX
A. Nintendo Switch 8. A virtual machine
B. Windows and Mac OS X A. uses secondary storage instead of
C. Apple RAM when the computer runs out of space
on the main memory
D. Microsoft
B. allows software to act as hardware,
4. The basic input/output system (BIOS) is running code or an operating system
stored on a chip. within another OS.
A. ROM C. can only be used through the internet
B. CPU D. relies on cloud storage
C. RAM 9. Windows is an example of soft-
D. CMOS ware.{Use appropriate answer}

5. Segmentation: A. System

A. Splits processes into variable sized B. Computer


pieces C. Application
B. Splits processes into set sized pieces D. All of these

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 74

10. To scramble data so that it is unreadable C. data compression


is a form of ? D. anti-virus
A. Compression E. firewall
B. Encryption
16. Decompressing is when:
C. Backing up
A. Refers to the process of converting
D. Defragmentation
(extracting) a compressed file back to the
11. Amount of time it takes to a storage de- original size

NARAYAN CHANGDER
vice to begin reading data B. File Explorer allows you to search for a
A. access time file based on certain criteria:file size, type
of file, partial file name, date accessed
B. write time
and even text in file
C. random time
C. Saving data om a format that can be
D. wait time read by different version of same applica-
tion or new application. Menu option ‘Ex-
12. A user is the combination of hardware
port’ or ‘Save As’.
and software that helps people and com-
puters communicate with each other. D. Opening or ‘reading’ data created in
A. panel different version of the same application
or new application.
B. system
C. surface 17. What software would be used to create a
logo
D. interface
A. Image editing software
13. The of the operating system enables B. Word processor
users to communicate with the computer
system. C. Presentation software
A. window D. Web authoring software
B. modem 18. Which best describes a full backup? An-
C. network adapter card swers:2
D. user interface A. A copy of all data and software on the
hard disk drive / server is copied to a
14. What type of software am I? Email soft- backup medium (e.g. an external hard
ware e.g. Microsoft Outlook disk drive / DVD-R) and the medium is
A. Operating System kept at a different location
B. Application software B. Take a long time to complete (usually
overnight)
C. Utility software
D. none of above C. A full backup is made initially before
the smaller daily backups
15. Which of the following are examples of D. Each night only the files which have
utility system software (hint:not security) been changed since the last incremental
A. encryption software back-up are copied
B. defragmentation E. Fast to backup.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 75

19. Microsoft excel is an example of Soft- 25. Which of the following is NOT a function
ware. of Operating System?

PRACTICE BOOK» NOT FOR SALE


A. Spreadsheet A. Booting the computer
B. Word Processing B. Managing resources and jobs
C. Presentation C. Interfacing with users (typically via a
D. Reference GUI)
20. Optimizing the use of main memory (RAM) D. Disk management
A. Memory Management 26. Which statement define the software?
B. System Management
A. *Software is a set of instructions that
C. File Management govern the computer about the drawing
D. Database Management and typing to be performed.

21. What type of software am I? Presentation B. *Software is a set of programs that in-
software, e.g. Microsoft PowerPoint structs the computer about the tasks to be
performed.
A. Operating System
C. *Software is a set of hardware por-
B. Application software tions that the control about the memory
C. Utility software and the hard disk to carryout results.
D. none of above D. None of the above.
22. It is a type of program that protects com- 27. The predominate personal operating sys-
puter systems from viruses and other dam- tem developed by Microsoft Corporation
aging programs.
A. Windows
A. Antivirus
B. Utility software B. MAC OS

C. File compression programs C. UNIX


D. None of the above D. LINUX

23. Which is not in the category of software 28. A restaurant has a computer-based order-
market? ing system which is running slowly. A
A. *OEM Software stands technician has said that the hard disc drive
is fragmented.Explain how defragmenta-
B. *Open-Source Software tion software could overcome the issue of
C. *Retail Software the slow computer system.
D. Embedded software A. Files on the hard disc drive are moved
(1)
24. Most desktop and laptop computers today
use this type of operating system. B. Empty spaces collected together (1)
A. real-time C. Files are moved to be stored together
B. single-user/single-task (1)
C. single-user/multitasking D. Fewer disc accesses are needed (1)
D. multi-user E. More disc access are needed (1)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 76

29. When you save a file using a Text editor it B. Perl


is saved to C. NetWare
A. Hard disk
D. UNIX
B. Ram
35. Which of the following is not a feature of
C. Monitor
an OS?
D. none of above
A. User Interface

NARAYAN CHANGDER
30. what does RAM stand for B. Systems Design
A. Running A Marathon C. User Management
B. Random Access Memory
D. Memory Management
C. Ruining A Memory
36. It is an environment in which a piece of
D. Random Asset Memory
software is executed.
31. Which are embedded operating systems A. File Management
A. Desktop OS B. Disk Management
B. Virtualization C. User interface
C. Mobile OS D. Digital Platform
D. Network OS
37. Which of the following is easy to remem-
32. Define cold boot. ber and makes Graphical User Interfaces
A. Turning on a computer that has been user-friendly?
powered off completely. A. Icons
B. Using the operating system to restart B. Menu
a computer.
C. Mouse
C. Always restart the computer.
D. Window
D. Turning on computer without connect-
ing the plug. 38. Software that allows or help user to per-
form related specific tasks
33. What is the purpose of a device driver?
A. Operating System
A. used to keep your computer files well-
organized B. Utility Program
B. used to write documents and create C. Word Processing
spreadsheets D. Application Software
C. make your hardware peripherals avail-
able to your applications 39. What are the two types of User Inter-
faces?
D. deliver packages to your door
A. Text-Based and Graphics-Based
34. is a multitasking operating system de-
B. Graphics-Based and Audio-Based
veloped in the early 1970s by scientists at
Bell Laboratories. C. Audio-Based and Text-Based
A. Linux D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 77

40. With a command-line interface, 44. What are examples of Operating Sys-
A. user can give command by lining up the tems?

PRACTICE BOOK» NOT FOR SALE


instructions. A. Word, Chrome, Defrag
B. a user can command anyone to help B. Firefox, Disk Repair, Word
them. C. Word, Chrome, Firefox
C. user can interfere with any command. D. None of the above
D. a user uses the keyboard to enter data
and instructions. 45. Halim wants to play interactive 3D games
using desktop computer. What adapter
41. The role of the Memory Address Register that Halim should install?
is to A. Sound card
A. Hold the current instruction being exe- B. Network card
cuted
C. Video card
B. Hold the address of the next instruc-
tion to be executed dividing it into an op- D. Joystick card
code/operand 46. A set of instructions that tell the computer
C. Hold the address of the memory loca- what to do.
tion where data is fetched to be fetched A. Program
from or written to
B. Path name
D. Used to temporarily store data that is
read from/written to memory C. WYSIWYG
D. Multitasking
42. UNIX is an example of this type of operat-
ing system. 47. Utility Programs that:Reorganize all scat-
A. real-time tered data and restore file in contiguous
location
B. single-user/single-task
A. Program Uninstaller
C. single-user/multitasking
B. Disk Defragmenter
D. multi-user
C. Backup Utility
43. John received computer hardware from a D. Data Recovery Utility
friend who lives in the United States of
America, but the some of the software 48. How many instructions can be carried out
was missing. He therefore, decided to pur- per pulse of the clock?
chase the necessary software. Since John A. 1
intended to use the computer in his family
business, he had a choice of acquiring soft- B. 1000
ware designed especially for his business. C. 100000
What kind of software is this? D. 10000000
A. General Purpose
49. Operating system software that allows
B. Custom written more than one user to access the same
C. Integrated data is called:
D. Specialized A. Multitasking operating system

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 78

B. Multi-user operating system 55. You would like to create a document in


your computer.You need
C. Single-user operating system
A. A text editor
D. File managing operating system
B. A video palyer
50. What is Mac operating system known as? C. Paper and pen
A. iOS D. none of above
B. OS X 56. Which part of the operating system deals

NARAYAN CHANGDER
C. Windows with the movement, editing and deletion
of data?
D. Windows 10
A. Memory management
51. Protect computers and users B. File and disk management
A. File Compression Programs C. User management
B. Backup and recovery utilities D. User interface
C. Clean Up Utilities 57. It is the outermost layer of the operating
system that provides a way for you to
D. Security programs
communicate with the operating system.
52. The on-screen tools you use to interact A. Kernel
with a computer are called the Lesson B. Shell
7-1
C. File system
A. operating system
D. none of above
B. interface
58. Software is;
C. applications
A. instructions that control processing
D. controls
B. programs or sets of instructions
53. What type of software am I? I am the com- C. the meeting point between parts of a
municator between applications software system
and hardware. D. the general term of components
A. Operating System needed to perform a task

B. Application software 59. Which of the following is not a utility pro-


gram?
C. Utility software
A. Disk repair program
D. none of above
B. Backup program
54. What type of software am I? Windows C. Spreadsheet program
A. Operating System D. File defragmentation program
B. Application software 60. Utility programs are usually ? (1-3)
C. Utility software A. Part of the Operating System
D. none of above B. Bought on a disk from a store

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 79

C. Only needed if you connect to the In- B. It connects all of the components with
ternet cables.

PRACTICE BOOK» NOT FOR SALE


D. Very Expensive to buy C. It makes the computer system faster.

61. Recordable CDs contain a dye covered sur- D. none of above


face which is translucent to light and can
66. A file utility is a utility that shrinks the
be burnt to stop the reflection. What
size of a file(s).
‘burns’ the CD?
A. unit
A. laser
B. compression
B. high intensity light
C. matrix
C. magnetic stamp
D. conversion
D. fire
67. Files can be grouped together into
62. is a type of system software that al-
these.Lesson 7-2
lows a user to perform maintenance-type
tasks A. folders
A. Operating system B. utilities
B. System Software C. programs
C. Application software D. operating systems
D. Utility program 68. An example of system software is:
63. Make the backup and restoration process A. Word Processors
easier B. Antivirus
A. File Compression Programs C. Web browsers
B. Backup and recovery utilities
D. none of above
C. Clean Up Utilities
69. Which key is used to capitalise one letter
D. Security programs
at a time?
64. Organizes and coordinates how multiple A. Caps Lock
users access and share resources on a net-
B. Backspace
workWhich function of OS related to this
description? C. Shift
A. Providing user interface D. Enter
B. Controlling a network E. Shift
C. Managing programs 70. Most operating system perform similar
D. Managing memory functions, except
E. Starting and shutting the computer A. Scheduling jobs

65. Which one of these best describes a func- B. Control a network


tion of an operating system? C. Managing programs
A. It allows the users to run apps. D. Distributed programs

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 80

71. Reduce the size of a file(s).Which utility 76. components in a processor are:
program refers to this description?
A. Control processing unit and Mathemat-
A. File Manager ical Unit
B. Disk Cleanup B. Logical unit and mathematical unit
C. File Compression Tools C. Control unit, arithmetic and logical unit
D. Spyware Remover D. System unit and processing cycle

NARAYAN CHANGDER
E. Antivirus Program 77. RAM is what kind of memory?
72. Choose the best answer. It is an interface A. Permanant
that displays text, and its commands are B. Forever
usually typed on a command line using a
keyboard. C. Slow

A. Command prompt D. Temporary

B. Graphical User Interface 78. Which one of the following best describes
C. Text-based User Interface utility software?

D. none of above A. A series of gaming apps.


B. Software that allows you to do specific
73. Which one is not an operating system? tasks e.g. Make slideshows and type let-
A. Windows ters.

B. Linux C. Software that keeps your computer


system healthy.
C. Android
D. none of above
D. Poloroid
79. which of the following are false about the
74. It is the two or three or four letters af- operating system
ter the dot in a filename. It also indicates
what kind of file you are dealing with. A. deal with file management

A. File name B. manages system security

B. File extension C. organise the CPU and its processing


tasks
C. File size
D. help send and receive data
D. File management
80. The is a small symbol displayed on the
75. A signal from a software program, hard- screen that moves when the user moves
ware device or internal clock to the CPU. the mouse
A. process A. icon
B. Instruction B. menu
C. processor scheduling C. window
D. Interrupt D. pointer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 81

81. The process of carrying out a command is 87. There are two types of backup.Answers:2
called: A. Full

PRACTICE BOOK» NOT FOR SALE


A. Fetching B. Incremental
B. Controlling C. Partial
C. Storing D. Complete
D. Executing
88. What does the word autonomous mean?
82. Data Harvesting Scandle who is responsi- A. to act on their own without human in-
ble put
A. Facebook B. to be able to process information
B. Cambridge analytica quicker than a human
C. Both C. to be able to drive a car
D. None D. to create a robot

83. , , and are types of Application 89. Version (flavor) of UNIX available without
Software charge over the Internet
A. Windows
A. PowerPoint
B. MAC OS
B. Video editing software
C. UNIX
C. Word processing software
D. LINUX
D. Spreadsheet software
90. Designed for consumer and industrial de-
84. All memory is measured in what? vices that are not personal computers
A. Meters (m) A. Windows Mobile
B. Volume (v) B. Windows Embedded
C. Giga Bytes (GB) C. Android
D. Inches (in) D. none of above
85. Which utility is used to exit from a non- 91. Julian buys a new laptop with a system
responsive program? information utility and a diagnosis util-
A. Task Manager ity.Describe, using examples, the purpose
of the system information and diagnosis
B. Disk Cleanup
utilities.Select the description and exam-
C. System Refresh ple of System information utilities.
D. File Explorer A. displays important data about the cur-
rent state of the computer
86. Which Operating System function enables
access levels to be given? (1-3) B. -e.g. temperature, free memory, net-
work speed, % processor used
A. User Interface
C. attempts to detect / resolve items that
B. Memory Management are not working correctly
C. User Management D. e.g. missing drivers, network connec-
D. File Management tion

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 82

92. Designed for use with smart phones. C. physical memory


A. iPhone OS D. splitting
B. BlackBerry Operating System 98. What is the main benefit of proprietary
C. Palm OS and Palm webOS software?
D. Symbian OS A. It has been thoroughly tested.

93. Protects a computer against viruses.Which B. It can be changed by anyone.

NARAYAN CHANGDER
utility program refers to this description? C. It is expensive.
A. File Manager D. none of above
B. Disk Cleanup 99. It is intended to serve real time application
C. File Compression Tools that process data as it comes in.
D. Spyware Remover A. Network OS
E. Antivirus Program B. Real-time OS

94. These are programs that reduce the size of C. Multi-user OS


computer files D. Internet/Web OS
A. Antivirus
100. Which part of the operating system will
B. File compression programs move data from the RAM to the virtual
C. Backup programs memory to allow the computer to perform
tasks as though the computer had more
D. None of the above RAM?
95. Two dangers of not updating operating A. Memory management
system software are ? B. File and disk management
A. You loose the license rights C. User management
B. You computer will defragment D. User interface
C. Your computer is vulnerable to attack
101. The operating system lets you change
D. You miss out on new features some features of the , such as the look
96. Ahmad use this utility program so that the of the background or the placement of the
OS accesses data more quickly and pro- icons.Lesson 7-1
grams run faster. A. options
A. Power source utility B. programs
B. Disk defragmenter utility C. desktop
C. Disk cleanup utility D. memory
D. Run away and never come again.
102. Pre-emptive version of shortest job first.
97. Splits memory and/or programs into logi- If a new job requires less time than the
cal blocks containing modules or routines job that is currently running, then the cur-
rently running job is terminated so that the
A. Paging shorter job can run. Long jobs may not
B. Segmentation reach the front of the queue

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 83

A. Shortest job first 107. Allows the user to compress the size of
large files for easier storage sending data.
B. First come first served

PRACTICE BOOK» NOT FOR SALE


C. Shortest remaining time A. Compression Software

D. High priority job B. Antivirus Software


C. Computer games
103. The von Neumann architecture proposes
the design for a stored program computer D. presentation apllications
where both and are stored in the
108. Needle on a magnetical drive that writes
same memory.
data to the disc
A. instructions & data
A. read/write head
B. data & power
B. read/write pit
C. questions & answers
C. read/write land
D. ant & dec
D. read/write needle
104. Operating Systems need to manage Sys-
tem ? 109. What type of software works with users,
application software, and computer hard-
A. Objectives ware to handle the majority of technical
B. Electricity details
C. Restores A. Application
D. Resources B. Operating System
C. Linux
105. A type of software that allows a single
physical computer to operate as though it D. System software
were two(2) or more separate and inde-
pendent computers. 110. What is the Operating System?
A. Virtualization A. The software that manages many of
the basic tasks of the computer
B. Antivirus
B. A specific type of Application Software
C. Utility
C. The software that provides an environ-
D. None of the above
ment for other software to run in
106. User Management D. None of the above
A. Provides a method to communicate
111. speeds up your hard disk
with the system
A. It protects your system from Trojans
B. Provides options to manage your files
and viruses
and folders
B. Disk defragmenter
C. allows the os to manage the hardware
devices C. It looks at your current system re-
sources
D. Allows each user to have different ac-
counts on the system D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 84

112. Which of these are false 117. What rearranges parts of the file on the
A. the cloud is easy to use disk drive to move them all to the same
area for quicker access?
B. the cloud can be accessed on any de-
vice A. Firewall
C. you need internet to use the cloud B. Disk Defragmentation
D. data can be added to the cloud on any C. File Compression
device
D. Encryption

NARAYAN CHANGDER
E. you need a wired connection to use the
cloud 118. A type of operating system which allows
more than one program to run at the same
113. What kind of problems are solved by al- time.
gorithms?
A. Multi-tasking operating system
A. Compression algorithms
B. Route-finding algorithms B. Multi-user operating system

C. Encryption algorithms C. Real time operating system


D. Internet-related algorithms D. Distributed operating system

114. Lossless compression is ? 119. Windows, icons, menus and pointers are
A. Usually performed on video files all part of what?
B. When some original data is lost and A. Graphical user interface
the original file cannot be re-created B. Command line interface
C. The original file can be re-created from
C. Menu interface
the compressed file
D. Objects interface
D. Turning the text into a format that only
a reader with a key can decrypt it
120. A user interface
115. A web browser is an example of? A. Provides a method to communicate
A. Operating system software with the system
B. Application software B. Is a graphical layout
C. The Internet software C. Is user management
D. A touch screen interface D. Allows users to have different ac-
116. A is a flash device with a storage ca- counts
pacity similar to a small hard drive. They
121. Why we need computer software?
are faster than hard drives, they have no
moving parts, and they have lower power A. *Software is required for the function-
consumption than hard drives. ing of computer.
A. Solid State Drive B. Instruct computer about the actions to
B. Hard Disk Drive be performed
C. Optical Drive C. To get perform a task or set of tasks
D. none of above D. Non of these

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 85

122. State two examples of File Manager Util- 127. What is Hardware?
ity program. A. Microsoft Word

PRACTICE BOOK» NOT FOR SALE


A. Finder B. Programs or Apps that can be run on a
B. Windows Disk Cleanup computer
C. Windows Explorer C. Google Chrome
D. PhoneClean D. Physicals parts of a Computer
E. WinZip 128. Which of the following are types of soft-
ware?
123. How many different languages of pro-
gramming are there? (estimate) A. System Software
B. Programming Software
A. All programming is in one
C. Operating Software
B. 100
D. Application Software
C. 500
D. 700 129. Which best describes an incremental
backup? Answers:4
124. What law was created to counteract A. A full backup is made initially
hacking? Under this law it is an offence to
gain unauthorised access to computer ma- B. Each night only the files which have
terial without permission, or destroy unau- been changed since the last incremental
thorised software/data intentionally. back-up are copied
C. Much faster to complete that full back-
A. Data Protection Act
ups
B. Computer Misuse Act
D. Takes much longer at restoring than a
C. Regulation of Investigatory Powers Full Back up as the full back up would need
Act (RIPA) restoring first and then every incremental
D. Copyright Act back-up since the last full back up
E. Take a long time to complete (usually
125. The translator which perform macro ex- overnight)
pansion is called a
130. Tool in optical drive that reads informa-
A. Macro processor
tion
B. Macro pre-processor
A. needle
C. Micro pre-processor B. laser
D. assembler C. tape
126. What software would be used to create D. sensor
an information sheet e.g. a revision mat
131. State two examples of Disk Cleanup pro-
A. Image editing software gram.
B. Word processor A. Finder
C. Presentation software B. Windows Disk Cleanup
D. Web authoring software C. Windows Explorer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 86

D. PhoneClean 137. What is the name given to software that


can be used by many people for a wide
E. WinZip
range of tasks?
132. Which of the following is a proprietary A. Custom-written
OS for desktop and laptop computers? B. Integrated
A. Windows C. General-purpose
B. iOS D. Special-purpose

NARAYAN CHANGDER
C. Android 138. State three (3) examples of Server OS.
D. Linux A. BlackBerry OS
B. Android OS
133. Windows XP, Windows 7, and iOS 12
are examples of: C. UNIX

A. Operating systems D. Solaris


E. NetWare
B. Application software
C. Utility software 139. The Windows app used for locating files
and folders is ..
D. General Purpose software
A. Disk Manager
134. Removable, portable storage device in- B. Finder
serted into a usb port C. File Explorer
A. flash drive D. Library Explorer
B. laser drive 140. What is the function of a firewall?
C. optical drive A. Putting fragmented data back to-
D. magnetic drive gether.
B. Stopping unauthorised access in the
135. Can computers operate without a operat- computer system.
ing system? C. Scans the computer for viruses.
A. Yes D. none of above
B. No
141. Operating systems need to manage
C. Sometimes what?
D. WOAH A. Objectives
B. Electricity
136. What are the storage locations inside a
C. Restoration of files
CPU called?
D. Resources
A. Registers
B. RAM slots 142. Utility software is extra software that
the Operating System doesn’t provide for.
C. Control Memory Tick three utility software
D. Open Memory A. Virus Scanner

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 87

B. Excel 147. Which of the following is NOT a common


type of operating system?
C. System monitor

PRACTICE BOOK» NOT FOR SALE


A. Firefox
D. Disk defragmenter
B. Mac OS X
E. Application software
C. Windows
143. What is the function of interface? D. Linux
A. Provides an interface to interact with
148. A type of suite that is stored at a server
the operating system
on the Internet and is available anywhere
B. Allows multiple applications to run at you can access the internet.
the same time
A. Database
C. Provides tools to manage and organ- B. Email
ise hardware
C. Cloud
D. Provides user accounts and pass-
words. setting up policies to provide user D. None of the above
rights over the computer 149. Why we need to have secondary stor-
age?
144. A set of instructions which control the
computer is A. Store large volume of data that exceed
the capacity of main memory
A. Firmware
B. Perform arithmatic and logical opera-
B. Software tions
C. Device manager C. To give power to the system too
D. Hardware D. To help processor in processing
145. Which of the following is NOT a Windows 150. What is software?
utility program?
A. Interface between the computer and
A. Disk Cleanup the user
B. Desktop Cleanup B. Powerful commands
C. Defragment and Optimize Drives C. Stored set of instructions
D. System Restore D. The general term for computer pro-
grams
146. With the Macintosh Operating System
where do you go in order to make any 151. Which statement is incorrect regarding
changes to your computer (desktop back- operating systems?
ground, printer settings, trackpad ges- A. A software on the machine interacts
tures, etc )? with the hardware via the operating sys-
tem
A. System Preferences
B. Any computer system you use has an
B. Finder
operating system
C. Mission Control
C. The user interacts with the machine
D. Launchpad via the operating system

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 88

D. Operating system intermediates be- 157. and are examples of Utility Soft-
tween the hardware and the user ware.
E. Run for specific tasks. A. File Manager & Operating System
152. Which of the following is/are Online B. File Manager & IOS
Storage? C. File Manager and Backup Software
A. One Drive D. none of above
B. Icloud

NARAYAN CHANGDER
158. A software repository is ?
C. Google Drive
A. Software already available for pur-
D. All of them
chase
153. Operating system utilities is B. An online collection of software
A. Computers that perform system main- C. combination of hardware and systems
tenance and administrative tasks software that supports the running of ap-
B. Programs that perform system mainte- plications
nance and administrative tasks D. none of above
C. Hardware that perform system main-
tenance and administrative tasks 159. A collection of instruction that performs
a specific tadka when executed by a com-
D. Disks that perform system mainte-
puter
nance and administrative tasks
A. Application Software
154. Utility Programs that:Detect and correct
logical errors on hard disk B. System Software

A. Program Uninstaller C. Computer Hardware


B. Disk Scanning Program D. Computer Software
C. Disk Defragmenter 160. Choose the Apple operating system
D. Data Recovery Utility A. Windows
155. There are two types of computer soft- B. Android
ware, and
C. Linux
A. System Software
D. Mac OS X
B. Spreadsheet software
C. Ms Word 161. The role of scheduling is
D. Application software A. To make sure tasks get as much time
as they need on the CPU
156. Which of the following tasks is NOT per-
B. To make sure that all tasks get time
formed by the operating system? Lesson
on the processor and respond in a reason-
7-1
able time
A. managing computer memory
C. To make sure that the user does not
B. managing the CPU have to wait for processes to run
C. managing the formatting in a letter D. To prevent the user from crashing the
D. managing input devices computer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 89

162. Which one is not a developing software C. The same


category? D. none of above

PRACTICE BOOK» NOT FOR SALE


A. Programming language
168. A(n) operating system supports two
B. Translator software or more processors running programs at
C. Linker and Loader the same time.
D. System Utilities softwares A. virtual
B. indexed
163. Use the Windows to check on a non-
responsive program. C. multiprocessing
A. System Restore D. fault-tolerant
B. Backup utility 169. An OS which you would use in day-to-day
C. Error-checking life on a normal school computer is a
D. Task Manager A. Embedded
B. Real Time
164. Which kind of software will offer a free
trial for a short time before you need to C. Distributed
pay? D. Multi-Tasking
A. Open source software E. Multi-User
B. Freeware 170. How does the user interact with the Op-
C. Proprietary software erating System?
D. Shareware software A. GUI
B. Command Line Interface
165. Where the result of an arithmetic and log-
ical operation are stored? C. Voice Input
A. In Accumulator D. Monitor
B. In Cache Memory 171. What key/s allow you to move to the
C. In ROM very beginning of the text file?

D. In Instruction Registry A. bb
B. G
166. A type of system software that allows a
C. gg
user to perform maintenance-type tasks.
D. 0
A. System software
B. Utility software 172. A is a thick magnetic disk encased in
a thicker protective shell. It consists of
C. Operating system
several aluminum platters, each of which
D. Desktop stand-alone requires a read/write head for each side.
167. Compared to open source software, retail A. Hard Disk Drive
software are generally: B. Solid State Drive
A. Less safe C. Optical drive
B. Safer D. Flash drive

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 90

173. I am running out of space on my hard 178. What are the advantages of using a mag-
drive, I should use the tool. netic hard disk? (select all that apply)
A. disk cleanup A. Store large amounts of data
B. email B. Low cost
C. disk defragment C. Fastest speed

D. backup D. Very portable

NARAYAN CHANGDER
179. What is the function of Process Manage-
174. Which is faster to back up and why?
ment in an operating system?
A. Full Backup A. Ensuring that antivirus software is al-
B. Incremental Backup ways up-to-date
C. More files will need to be backed up B. Managing the execution of programs
on a computer
D. Less files need to backed up as only
those that have changed since last time C. Communicating with the firewall to
need to be backed up. check network traffic
D. Offering the ability for data recovery
175. Uses data structures consisting of data and system restore
fields and methods together with their in-
teractions (objects) to design programs 180. It refers to the manipulation of docu-
ments and data in files on a computer.
A. Procedural programming
A. File Management
B. Object-oriented programming
B. Data Management
C. Declarative programming
C. Information Management
D. Functional programming
D. Disk Management
176. What are the reasons for compressing 181. What is not a purpose of system soft-
video files for sharing on the internet. ware?
A. To use less capacity on the storage A. A set of programs that are written for
medium. a specific purpose
B. To enable a faster transfer of data. B. control computer hardware
C. For security. C. provide basic functionality to com-
D. To allow streaming. puter
D. act as an interface between user, ap-
177. Data Compression plication software and computer hard-
A. Maintain a computer ware

B. Provides options to manage your files 182. At the start of the process the require-
and folders ments are defined and the developers
work towards an initial prototype. Each
C. Allows the os to manage the hardware
successive loop around the spiral gener-
devices
ates a refined prototype until the product
D. Reduces the size of a file is finished.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 91

A. Waterfall life cycle model 188. A local football club wants to use a com-
B. Agile modelling puter to store all its members’ records. It
wants to keep the club accounts as well

PRACTICE BOOK» NOT FOR SALE


C. Spiral model as send letters to its members. Select
D. Rapid application developement the THREE types of software the club will
need.
183. This type of software copies data from a
hard drive to another storage device, such A. Presentation
as a CD-R drive.Lesson 7-2 B. Database
A. program utility C. Spreadsheet
B. driver utility D. Wordprocessing
C. back-up utility E. Measurement
D. compression utility
189. Give two examples of utility software
184. These programs carry out precise and A. Word and anti-virus
accurate tasks.It helps manage, maintain
B. Compression software and Power-
and control all computer resources.
point
A. Operating System
C. Disk defragmenter and file manage-
B. Application System ment software
C. Utility System D. none of above
D. None of the above
190. These are designed to run all of its appli-
185. Utility Programs that:Makes a duplicate cations and services thru a web browser.
copy of selected file or entire hard disk A. Real-time OS
A. Program Uninstaller B. Internet/Web OS
B. Disk Scanning Program C. Multi-user OS
C. Backup Utility D. Network OS
D. Data Recovery Utility
191. Designed for Palm devices.
186. A single user/single operating sys-
A. iPhone OS
tem allows only one user to run one pro-
gram at a time. B. BlackBerry Operating System
A. throttle C. Palm OS and Palm webOS
B. function D. Symbian OS
C. indexing 192. What is File Management?
D. tasking A. The part of the Operating System that
manages the memory of the system
187. The layout arrangement of the different
devices in a network? B. Specific purpose software used for
specific tasks
A. Open System
B. Closed Sytem C. The part of the Operating System that
performs specific tasks such as creat-
C. Network Topology ing, opening, closing, deleting, renaming,
D. Computer Network copying, moving files

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 92

D. None of the above D. Device driver program

193. How many of the following statements 197. Which one of these best describes open
are FALSE? ( choose as many as are appro- source software?
priate) A. A type of operating system.
A. An incremental backup is more B. Free software downloaded from the in-
straightforward to restore than a FULL ternet.
backup
C. Software bought from a shop.

NARAYAN CHANGDER
B. A Command Line Interface Operating
system is more intuitive to a user than a D. none of above
GUI 198. An assembler translates assembly code
C. Full backups take longer to complete language into
and require more disk space A. High Level Language
D. Menus are easy for users to under- B. Machine Code
stand but can be restrictive in terms of
C. Processor Code
choices
D. Mnemonics
194. A fragmented hard drive is one in which
? 199. Which type of operating system is used
to control large equipment and to regulate
A. Program instructions and data are
factory operations? Lesson 7-1
spread across tracks and sectors on the
hard disk drive A. real-time
B. Programs and instructions are B. single-user/single-task
grouped together to occupy a continuous C. single-user/multitasking
section of the harddisk drive
D. multi-user
C. A hard disk drive that has been
dropped and broken into lots of pieces 200. Disk Cleanup, Task Manager and File Re-
covery are considered to be
D. The hard disk drive is split into por-
tions each representing a different logical A. root directories
drive. B. file management systems
195. Which one of the following is a compres- C. Windows utility programs
sion software? D. Accessibility Utilities
A. OptimFROG 201. An application programming interface
B. MacOS (API) is
C. Steam A. the code the CPU recognizes to per-
D. none of above form a procedure in an application
B. the code to interface between an appli-
196. The following are the types of system cation and a peripheral like a printer
software, except
C. the currently active part of an applica-
A. Utility programs tion
B. Operating systems D. the code to interface between an appli-
C. Application programs cation and RAM

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 93

202. The BIOS (Basic Input Output System) is 207. What does OS stand for?
stored in A. Operating System

PRACTICE BOOK» NOT FOR SALE


A. RAM B. Obtuse System
B. ROM C. Opportunity System
C. Virtual Memory D. What is an OS ?
D. Cache 208. Why will someone encrypt their files?
A. To scramble their data so that unautho-
203. This piece of software is used to control
rised users can’t access it.
hardware devices and allow an Operating
System to make use of the hardware (7-9) B. To scramble their data so that they get
confused.
A. Device Management
C. To clean up the useless data.
B. Device Driver
D. none of above
C. Device System
209. When the OS creates temporary RAM on
D. Hardware Peripheral Device the Hard Drive it is known as
204. What is Memory Protection? A. Virtual Memory
A. Ensuring that two running applications B. Cache
do not use the same addresses in main C. Registering
memory D. Defragmenting
B. Allocating memory to an application in
210. Delete temporary files.
the most effective manner
A. File Compression Programs
C. Keeping track of which memory ad-
dresses are available and which are taken B. Backup and recovery utilities

D. None of the above C. Clean Up Utilities


D. Security programs
205. What type of software is needed to con-
trol the computers hardware? 211. These are programs that make copies of
files to be used in case the originals are
A. Programming software lost or damaged
B. Systems software A. Backup programs
C. Application software B. Antivirus
D. Bespoke software C. Utility Software
D. None of the above
206. Types of operating systems:
212. Name of the software which controls
A. Unix
hardware devices?
B. Robotics A. Device management
C. Linux B. Device system
D. Windows C. Peripheral firmware
E. Business D. Device driver

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 94

213. A collection of programs that manage B. *Spreadsheet Software


and coordinate the activities taking place C. *CAD/CAM Software
within a computer system
D. Anti Virus Software
A. Payroll System
E. *Accounting Software
B. Library System
C. POS System 219. Networks, servers, mainframes, and
supercomputers allow hundreds to thou-
D. Operating System sands of users to connect at the same time,

NARAYAN CHANGDER
214. Designed for Apple Mobile phones and and thus are
mobile devices. A. single user
A. iPhone OS B. single processing
B. BlackBerry Operating System C. multiuser
C. Palm OS and Palm webOS D. multiprocessing
D. Symbian OS 220. holds many components of the sys-
215. What does the user interface do? tem and provides connectors for other pe-
ripherals.
A. Allows users to communicate with the
computer A. USB

B. Downloads programs and applications B. Touch screen

C. Manages printers and scanners C. Motherboard

D. Acts as the essential center of a com- D. CPU


puter operating system 221. State two examples of Antivirus pro-
216. This operating system is installed on gram.
more than 90 percent of personal comput- A. Finder
ers. B. Avira
A. Linux C. Kapersky
B. UNIX D. PhoneClean
C. Microsoft Windows E. WinZip
D. Macintosh OS
222. It is starting of a computer that has been
217. What type of software interact with the turned off
hardware A. Warm Boot
A. application software B. Soft Boot
B. Norton by Semantic C. None of the above
C. System Software D. none of above
D. none of above
223. The program that combines the output of
218. Which one is not the example for applica- compiler with various library functions to
tion software? produce an executable code is called-
A. *Word Processing Software A. a. Loader

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 95

B. . b. Linker 229. Which method of backup takes longer to


C. c. Assembler perform?

PRACTICE BOOK» NOT FOR SALE


D. d. Debugger A. Incremental

224. Choose the best answer. The following B. Full


are considered as roles of the operating C. Fragmented
system except for:
D. Differential
A. Management of the processor.
B. Management of the RAM. 230. Which of the following is NOT a category
C. Management of input/output. of application software
D. Management of the motherboard. A. Integrated software
225. What is the function of antivirus? B. General Purpose software
A. Protect computer against virus. C. Entertainment software
B. Protect computer from bacteria. D. Special Purpose software
C. Damaging the computer program.
D. Remove computer form viruses. 231. Diagnose and repair problems related to
your hard drive
226. Which Operating System function en-
sures any device can be used with the op- A. Search Tools
erating system, as long as a driver is avail- B. Diagnostic Programs
able for it? (4-6)
C. Disk Management Programs
A. Peripheral Management
D. Uninstall utilities
B. Memory Management
C. User Management 232. The Operating System is a program that
D. File Management allows different and various pieces of
hardware to with each other.
227. Most supercomputers use the operat-
ing system. A. application, software
A. UNIX B. software, application
B. Linux C. application, communicate
C. Windows
D. software, communicate
D. iOS
233. Quality Developers is a company that
228. For a very large and complex system
writes programs to do specific jobs for
which needs multiple processors, you
other companies. These programs are
would use a OS:
called
A. Embedded
A. general-purpose software
B. Real Time
C. Distributed B. special-purpose software

D. Multi-Tasking C. custom-purpose software


E. Multi-User D. off-the-shelf software

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 96

234. Choose three (3) types of Operating Sys- B. Spreadsheet


tem. C. Word Processor
A. Desktop Operating System D. Graphics and Multimedia Software
B. Utility Program
240. State two examples of Spyware pro-
C. Server Operating System gram.
D. Mobile Operating System A. Finder
E. Application Software

NARAYAN CHANGDER
B. Spyware Doctor
235. Open Source Software is ? C. Spyware Terminator
A. NOT safe D. Windows Explorer
B. Safe E. MyDefrag
C. KIND OF safe 241. An integrated software package:
D. The safest A. Can transfer data from one component
to another very easily
236. Example of system software are:-Choose
ALL that apply. B. Costs less than individual applications
A. Microsoft Word C. Takes up less disk space than individ-
ual applications
B. Linux
D. All of the above
C. Unix
D. Windows 8 242. Choose the correct THREE reasons why
we need to make Backup.
E. Mozilla firefox
A. files can be purposely overwritten or
237. The type of software that the users run deleted
to do various tasks on a computer is
B. hardware failures-disk drive crashes
A. System Software
C. devices can be stolen (with data and
B. Application Software files stored on them)
C. Utility Software D. disasters-fires, earthquakes and
D. Operative Software floods can destroy hardware

238. is software which allows a computer 243. Files can be grouped together into these
to run and to be maintained. A. folders
A. Application software B. utilities
B. System software C. programs
C. MS Word D. operating systems
D. none of above 244. Which one of these best describes appli-
239. A type of software used to create and cation software?
manipulate documents that contain text A. Antivirus software.
and graphics. B. Software that allows you to make
A. Database slideshows and type letters.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 97

C. Software that keeps your computer 250. Clock speed is measured in cycles per sec-
system healthy. ond. 3GHz means

PRACTICE BOOK» NOT FOR SALE


D. none of above A. 3000 cycles (instructions) per second
B. 3 million cycles (instructions) per sec-
245. Evaluate your system and make recom-
ond
mendations for fixing any errors found
C. 3 cycles cycles (instructions) per sec-
A. Search Tools
ond
B. Diagnostic Programs
D. 3 billion cycles (instructions) per sec-
C. Disk Management Programs ond
D. Uninstall utilities 251. What law states that your data can be
handed over to the police or security ser-
246. Which one of these is an Open source
vices to prevent terrorism and crime?
software?
A. Data Protection Act
A. MySQL
B. Computer Misuse Act
B. Steam
C. Regulation of Investigatory Powers
C. Skype Act (RIPA)
D. none of above D. Copyright Act
247. Operating Systems need to manage Sys- 252. This is the general term for any program
tem ? (1-3) and procedure running within your com-
A. Objectives puter system.
B. Electricity A. Software
C. Restores B. Hardware
D. Resources C. Peopleware
D. None of the above
248. The following is NOT a type of Systems
Software? 253. what does the cloud use to work
A. Device Drivers A. a hard disk
B. Utility Programs B. the internet
C. Applications C. usb stick
D. Operating Systems D. hard drive

249. Which of the following is the function for 254. Select the software below that is APPLI-
compression tool? CATION software.
A. To shrink the size of the file A. Spreadsheet
B. To manage the files in folder B. Google Chrome

C. Perform file management related task C. Utilities


D. Wordprocessing
D. none of above E. Windows 10

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 98

255. Process of splitting memory and/or pro- C. It should execute efficiently, in as few
grams up into blocks of the same physical steps as possible
size.
D. It should be designed in such a way
A. Segmentation that other people will be able to under-
B. Paging stand it and modify it if necessary.

C. Virtual memory E. It has clear and precisely stated steps


that produce the correct output for any set
D. Physical memory

NARAYAN CHANGDER
of valid inputs.
256. Remove programs from your hard drive
without leaving bits and pieces behind 260. Which utility temporarily removes redun-
dancies in a file to reduce the file size?
A. Search Tools
A. Disk Cleanup
B. Diagnostic Programs
B. File Compression
C. Disk Management Programs
D. Uninstall utilities C. Error-checking
D. Defragment and Optimize Drives
257. An OS manages multiple programs
and processes while you use the com- 261. Programs written in low-level languages
puter.Which function of OS related to this (select all that apply)
description?
A. are less memory intensive
A. Providing user interface
B. allow the programmer to directly con-
B. Controlling a network
trol hardware (in embedded systems)
C. Managing programs
C. easy to write and test
D. Managing memory
D. easy to run on any machine
E. Starting and shutting the computer
262. This following is an example of a periph-
258. Reorganizes files and unused space on a
eral (7-9)
hard disk so that operating system access
data menu quickly and program run faster. A. Processor
Which utility program refers to this de-
B. Main Memory (RAM)
scription?
A. Restore Utility C. Hard Disk Drive

B. Disk Defragmenters D. ROM


C. File Compression Tools 263. This program contains data needed by a
D. Backup Utility program to operate an input or output de-
vice.Lesson 7-2
E. Antivirus Program
A. program utility
259. A good algorithm has which properties?
B. driver utility
A. It should allow invalid inputs
C. backup utility
B. It must always terminate at some
point D. compression utility

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 99

264. Which of the software below is best C. Programs


suited for doing research on the internet? D. All of the above

PRACTICE BOOK» NOT FOR SALE


A. Control program
269. A macro definition consists of
B. Database
A. A macro prototype b.One or more
C. Measuring program model statements
D. Search engine B. One or more model statement
E. Word processor C. Macro pre-processor statementsd.
265. What is true for the compiler? . D. All of the above
A. A compiler does a conversion line by 270. which of these does the Operating Sys-
line as the program is run tem manage
B. A compiler converts the whole of a A. Memory
higher level program code into machine
B. The CPU
code in one step.
C. The motherboard
C. A compiler is general purpose lan-
guage providing very efficient execution D. The keyboard
D. All of the above 271. When it comes to SCHEDULING, choose
the THREE options that best describes it.
266. Which of the following is not an example
of general-purpose applications A. Program that is used to run certain
hardware at specific times
A. Apple Pages
B. Automatically checks for updates
B. Google Slides
C. Automatically perform certain routine
C. Microsoft Publisher
housekeeping tasks
D. Microsoft Excel
D. Schedulers can be set to run in off-
267. Choose the answers that are TRUE. peak times
A. Cache memory is built into various 272. Which of the following is an example of
components on a computer, including the specialized programs combined in a unified
processor. package
B. Cache memory is cheaper, because it A. Windows 10
is slower than normal memory (RAM) but B. Microsoft Word
it can increase the overall performance of
a computer quite dramatically. C. Internet Explorer
C. In general, the higher the speed of the D. Microsoft Office
CPU, the slower it will perform.
273. Being able to run several applications at
D. Fragmentation has no affect on speed the same time is known as
of SSDs. A. Multi tasking
268. A folder or directory can contain: B. Application management
A. Files C. Multi cores
B. Folders D. Application control

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 100

274. Unencrypted messages are called which? D. Used to temporarily store data that is
(1-3) read from/written to memory
A. Plaintext 279. A utility software is used to
B. Ciphertext A. Maintain a computer
C. Keytext B. Provides options to manage your files
D. Originaltext and folders
C. Allows the os to manage the hardware

NARAYAN CHANGDER
275. The on-screen tools you use to interact devices
with a computer are called the
D. Allows each user to have different ac-
A. interface counts on the system
B. applications
280. An incremental backup..
C. controls
A. Makes copies only of the new files
D. operating system
B. Saves your backup to secondary stor-
276. To share one processor’s power between age
multiple people, you would use a OS: C. Makes copies of all files
A. Embedded D. Makes a copy of the entire drive
B. Real Time 281. File property is:
C. Distributed A. Additional data stored about a file
D. Multi-Tasking B. Property of file that can be set
E. Multi-User C. Basic information about files, name,
size and date modified
277. The application software used to arrange
and store large amount of information in D. Process of reducing the size of a file
organised manner 282. Simple applications that can be down-
A. Graphics software loaded cheaply; do not have capabilities of
full version.
B. Multimedia software
A. App
C. Database management software
(DBMS) B. Application
D. Presentation software C. Operating System
D. Software Program
278. The role of the Memory Data Register is
to 283. Some software programs develop
rapidly, gaining new features and adapt-
A. Hold the current instruction being exe-
ing to new uses, very often very spe-
cuted
cialised and experimental. The best soft-
B. Hold the address of the next instruc- ware in this case would be:
tion to be executed dividing it into an op-
A. open source
code/operand
B. proprietory
C. Hold the address of the memory loca-
tion where data is fetched to be fetched C. bespoke
from or written to D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 101

284. What is Encryption software used to do? 289. What are the disadvantages of using op-
A. Permanently change data tical disks? (select all that apply)

PRACTICE BOOK» NOT FOR SALE


B. Revert data to something it wasn’t be- A. slow access speeds
fore B. fragile and easy to break
C. Change data so it is unreadable by an C. very expensive
interceptor D. not portable
D. Change data so it is readable by an in-
terceptor 290. Which is the correct statement regarding
the “Application Software”?
285. This program contains data needed by a A. *A set of programs that are written
program to operate an input or output de- for a specific purpose and provide the
vice required functionality is called software
A. program utility package.
B. driver utility B. It may be a single program or a set of
programs
C. backup utility
C. *The software that a user uses for ac-
D. compression utility
complishing a specific task is the applica-
286. File Management tion software.
A. Provides a method to communicate D. Control the computer hatrdware and
with the system software.
B. Provides options to manage your files 291. Windows, Icons, menus and Pointers are
and folders all part of this?
C. allows the os to manage the hardware A. Graphical User Interface
devices
B. Command Line Interface
D. Allows users to have different ac-
C. Menu Interface
counts
D. No User Interface
287. Which of the following is an Input de-
vice? 292. Programs that control or maintain the op-
erations of the computer and its devices.
A. Printer
A. Operating System
B. Monitor
B. Utility Software
C. Speakers
C. System Software
D. Keyboard
D. Compression Software
288. Question 5:Dividing processor time be-
tween processes so that they appear to 293. The role of the Current Instruction Regis-
multitaskis known as:(1-3) ter (CIR) is to
A. Time Slicing A. Hold the current instruction being exe-
cuted
B. Fish Slicing
B. Hold the address of the current in-
C. Time waiting struction to be executed dividing it into an
D. Idle Time opcode/operand

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 102

C. Hold the address of the memory loca- B. Proprietary software


tion where data is fetched to be fetched C. Open Source
from or written to
D. All of these are copyrighted by the au-
D. Used to temporarily store data that is thor
read from/written to memory
299. what can store the most data
294. What do you call a program in execu-
tion? A. DVD

NARAYAN CHANGDER
A. Command B. BLU-RAY
B. Process C. CD
C. Task D. none of above
D. Instruction 300. Select the true statements about memory
paging:
295. Which of the following Windows utility
programs arranges pieces of files on your A. Processes are split into equal sized
hard drive to allow for faster access? frames
A. Disk Cleanup B. A page table is used to record all the
pages
B. Defragment and Optimize Drives
C. Unused pages are swapped out of
C. Error-checking
main memory and into virtual memory
D. Task Manager
D. Processes are split into variable sized
296. This testing is carried out by the software frames
developer’s in-house testing team.It is es-
301. A(n) operating system enables two
sential because it often reveals both errors
or more users to run programs simultane-
and omissions in the system requirements
ously.
definition.
A. multiplied
A. Beta testing
B. multiuser
B. Alpha testing
C. engaged
C. Black box testing
D. rasterized
D. White box testing
302. What does the systems software include
297. Two MAJOR category of software are:
from the following?
A. system software and utility programs
A. Utility software
B. operating system and system soft-
ware B. Drivers

C. utility programs and operating system C. Operating system

D. system software and application soft- D. Hardware


ware 303. Which method of backup is quicker to per-
298. What kind of software is copyrighted by form once an initial backup file is created?
the author? A. Full
A. Shareware B. Differential

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 103

C. Fragmented C. Only needed if you connect to the In-


D. Incremental ternet

PRACTICE BOOK» NOT FOR SALE


D. Very Expensive to buy
304. It is the program that runs and manages
the computer 310. Which of the following is not considered
to be system software?
A. Application Software
A. Graphics presentation software
B. System Software
B. Operating system
C. Programming Languages
C. Utility program
D. Internet
D. Language translators
305. Which of the following is NOT an Operat-
ing System 311. Julian buys a new laptop with a sys-
tem information utility and a diagnosis util-
A. Android ity.Describe, using examples, the purpose
B. Word of the system information and diagnosis
utilities.Select the description and exam-
C. iOS
ple of Diagnosis utilities.
D. Windows
A. displays important data about the cur-
306. Data is; rent state of the computer
A. individual facts input into a system B. -e.g. temperature, free memory, net-
work speed, % processor used
B. physical units that make up a system
C. attempts to detect / resolve items that
C. programs or sets of instructions are not working correctly
D. users of a system D. e.g. missing drivers, network connec-
tion
307. What type of back-up is slowest to re-
store from? 312. Which one of these best describes a
A. Fragmented Graphical user Interface?
B. Incremental A. They are easy to use because they
make use of icons.
C. Differential
B. They can be complicated for inexperi-
D. Full enced users.
308. A macro is C. They use special command to do tasks.
A. a small program inside a program
D. none of above
B. set of special instructions
C. a unit of specification for program gen- 313. The BIOS allows you to:
eration through expansion A. Change the computer’s time/date set-
D. None of the above tings
B. Change the order in which drives are
309. Utility programs are usually ? booted from
A. Part of the Operating System C. Change the computer’s operating sys-
B. Bought on a disk from a store tem

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 104

D. Change the user’s login details 319. Which is not a type of System software?

314. A single user/ operating system al- A. Device drivers


lows a single user to work on two or more B. Utility programs
programs that reside in memory at the C. Applications
same time.
D. Operating systems
A. multitasking
B. interfacing 320. Which of the following is NOT a function

NARAYAN CHANGDER
of an operating system
C. command-based
A. Managing resources
D. throttle
B. Providing user interface
315. This is also known as a photo editor, this C. Perform specific operations
specialized graphics program edits or mod-
ifies digital photographs. D. Running applcations

A. Presentation 321. What lets the computer’s hardware and


software work together?
B. Spreadsheet
A. Operating System
C. Image Editor
B. Application Software
D. Word Processor
C. Monitor
316. Which of the following is an example of
D. Central Processing Unit
a peripheral?
A. Processor 322. The flow control during macro expansion
is
B. RAM or Main Memory
A. combination
C. Hard disk drive
B. chronological
D. ROM
C. indexable
317. Operating system that are designed
D. sequential
specifically for mobile devices and many
consumer electronics deviceThis descrip- 323. What isn’t an example of Utility Soft-
tion refers to ware
A. Mobile OS A. Encryption
B. Desktop OS B. Task Manager
C. Server OS C. Kernel
D. none of above D. Anti-Virus
318. You can improve processor performance 324. is the process of starting or restart-
by (select all that apply) ing a computer.
A. increasing the clock speed A. Launching
B. using more cores B. Loading
C. using a bigger cache C. Booting
D. installing more RAM D. Keying

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 105

325. Which of the following is NOT a system 331. Two examples of software
utility? A. Mouse and word

PRACTICE BOOK» NOT FOR SALE


A. antivirus program B. OS and Internet Browser
B. disk checking program C. Keyboard and Mouse
C. word processing program
D. OS and webcam
D. disk defragmenting program
332. Choose the best answer. The follow-
326. File attribute is: ing are considered as system support pro-
A. Additional data stored about a file grams except for:
B. Property of file that can be set A. Utility programs
C. Basic information about files, name, B. Backup utilities
size and date modified C. Data recovery software
D. Process of reducing the size of a file D. Operating system
327. The discs that are used to store instruc- 333. The role of the Program Counter (PC) is
tion in a magnetic hard drive are called to
A. usb A. Hold the current instruction being exe-
B. ssd cuted
C. platter B. Holds the address of the next instruc-
D. actuator tion to be executed
C. Holds the address of the memory loca-
328. To scramble data so that it is unreadable
tion where data is fetched to be fetched
is a form of ? (4-6)
from or written to
A. Compression
D. Used to temporarily store data that is
B. Encryption read from/written to memory
C. Backing Up
334. An opcode is
D. Defragmentation
A. The operation to be performed on a set
329. What key allows you to move or delete of data
to the end of the current line? B. The data with which an operation is to
A. ! be performed
B. # C. Something which moves data around
C. $ the CPU
D. 0 D. none of above

330. RAM stores (select all that apply) 335. This was one of the first operating sys-
tems ever written.Lesson 7-2
A. Operating System
B. Files/Programs you are currently us- A. Linux
ing B. UNIX
C. BIOS C. Microsoft Windows
D. Backup data D. Macintosh OS

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 106

336. Something having no permission to per- 342. Which of these is an example of a periph-
form an action is: eral device?
A. inauthorised A. Processor
B. disauthorised B. Main Memory (RAM)
C. unauthorised C. Hard Disk Drive
D. misauthorised D. Monitor

NARAYAN CHANGDER
337. These are general-purpose programs that 343. Software applications are most likely to
creates text-based documents. list what kind of operating system require-
A. Word Processors ment?

B. Spreadsheet A. An operating system cost

C. Presentation B. An operating system speed

D. Image Editor C. A minimum operating system version


D. A maximum operating system version
338. The 2 types of system software are:
A. Application software 344. Which of the following is NOT a type of
application software?
B. Operating system
A. Word processor
C. Business software
B. Spreadsheets
D. Utility software
C. Windows
339. Stores the results of calculations made by D. Smart Draw
the ALU.
A. Program Counter 345. Which of the following statements is not
true
B. Memory data register
A. Buses typically consist of 8, 16, 32 or
C. Accumulator 64 lines
D. Current Instruction register B. Most modern computers use a range
340. User Interface of MS-DOS is of general purpose registers rather than
a single accumulator
A. Command line interface
C. Memory is divided into units called
B. Menu-driven interface WORDS which are variable in size
C. Graphical user interface (GUI) D. The ALU can perform mathematics
D. none of above with fixed and floating point numbers, as
well as logical shifts and boolean logic
341. Why is it important to keep the operating
system up to date? 346. It is used to support computer infrastrac-
A. Because it is a law ture?

B. To make your computer friendly A. Operating System

C. To protect your computer form mal- B. Device Drivers


ware C. Middleware
D. None of these D. Utility Software

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 107

347. Three functions of the operating system 352. Which of the following is not an example
A. User Interface, multitasking, commu- of system software?

PRACTICE BOOK» NOT FOR SALE


nicates with hardware via device drivers A. Language Translator
B. User Interface, multitasking, saving B. Utility Software
C. fetch, decode and execute instructions C. Antivirus Software
D. memory management, fetching in- D. Word Processors
structions, user interface
353. Detects and deletes spyware and other
348. Helps manage the system resources, in- similar programs.Which utility program
cluding memory management and schedul- refers to this description?
ing. All Applications use this to send and
A. File Manager
receive data to and from devices which lies
below the operating system. B. Disk Cleanup
A. operating system C. File Compression Tools
B. Kernel D. Spyware Remover
C. Control Unit E. Antivirus Program
D. Application software
354. Which one of these best describes propri-
349. Pre-installed permanent software of a etary software?
computer’s system is: A. A type of operating system.
A. deviceware B. Free software downloaded from the in-
B. firmware ternet.

C. hardware C. Software bought from a shop.

D. software D. none of above

350. Performs tasks at the same time. 355. The instructions that tell the computer
what to do is called:
A. Simultaneous Processing
A. Hardware
B. Multiprocessing
B. Input
C. Parallel processing
C. Software
D. none of above
D. Output
351. Define multitasking.
356. What do we call groups of online servers
A. Allows a single user to work on two or
that allow you to easily share and store
more programs at the same time.
documents outside of your local com-
B. Allows only one user to run one pro- puter?
gram at a time.
A. Desktops
C. Supports two or more processors run-
B. Cloud computers
ning programs at the same time.
D. Enables two or more users to run pro- C. Mainframes
gram simultaneously. D. Laptops

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 108

357. A collection of related data 363. What is a software?


A. Data Type A. The programs and other operating in-
B. Information formation used by a computer
B. A tool found on a device
C. Blog
C. A type of app
D. Database
D. none of above
358. This is restarting a running computer

NARAYAN CHANGDER
without turning off the power. 364. Embedded systems can be found in (select
all that apply)
A. Warm boot
A. Washing Machines
B. Soft boot
B. Alarm Systems
C. None of the above
C. Computers
D. none of above
D. Laptops
359. An example of the computer’s hardware
would be 365. Which type of interface uses ‘WIMP’

A. MS Word A. Command line

B. MS Publisher B. Graphical
C. Menu
C. Keyboard
D. Natural language
D. none of above
366. Which is the fastest type of cache mem-
360. It acts as an intermediary between the
ory?
user and the computer.
A. Level 1
A. Operating System
B. Level 2
B. Information System
C. Level 3
C. Disk Management System
D. Level 4
D. none of above
367. Designed to search for files on the user’s
361. Designed for BlackBerry devices. hard drive
A. iPhone OS A. Search Tools
B. BlackBerry Operating System B. Diagnostic Programs
C. Palm OS and Palm webOS C. Disk Management Programs
D. Symbian OS D. Uninstall utilities
362. A rectangular area that can contain a doc- 368. Amin buys a new computer with an op-
ument, program, or message. erating system and some utilities.Some of
A. Window the software in Amin’s computer is open
source.Describe what is meant by open
B. Textbox source software.Answers:3
C. Title Bar A. The source code is distributed with the
D. None of the above software

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 109

B. The customer can modify the source A. Boot process


code B. Program check

PRACTICE BOOK» NOT FOR SALE


C. The customer can redistribute the C. Start-up
source code (with the same licence / re-
strictions) D. Operating System Set-up
D. The program comes pre-compiled with 373. Question 11:This following is an example
no source code of a peripheral (7-9)
E. The customer must not modify the A. Processor
source code B. Main Memory (RAM)
369. Question 6:Operating Systems need to C. Keyboard
manage System ? (1-3)
D. ROM
A. Objectives
374. System software is
B. Electricity
A. software that manages the operation
C. Restores
of the computer
D. Resources
B. software that users install to perform
370. Which of the following is NOT a capabil- tasks
ity of UNIX? C. software that keeps the computer per-
A. It is multiuser forming at it’s best
B. It is multitasking D. none of above
C. It is a network OS 375. It is a program that acts an interface
D. It is only for supercomputers between the software and the computer
hardware.
371. Searching is when:
A. Cache
A. Refers to the process of converting
B. Operating system
(extracting) a compressed file back to the
original size C. CPU
B. File Explorer allows you to search for a D. RAM
file based on certain criteria:file size, type
376. Fill in the blank:Open Software
of file, partial file name, date accessed
and even text in file A. Source
C. Saving data om a format that can be B. Site
read by different version of same applica- C. Resource
tion or new application. Menu option ‘Ex-
port’ or ‘Save As’. D. none of above

D. Opening or ‘reading’ data created in 377. What is the definition of a “Process” in


different version of the same application computing?
or new application. A. A written code of a program stored on
372. Events that occur between the time you secondary storage
turn the computer on and when it becomes B. A program that is currently being exe-
ready to use. cuted (running)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 110

C. A piece of software that manages the B. Mac OS


execution of programs on a computer C. Linux
D. A piece of software that manages user D. Microsoft Excel
accounts on a computer
383. Google Docs, Microsoft Office 365 and
378. What allows a user to interact with the Zoho Office are examples of
Operating system?
A. Specialized Suite
A. User connection
B. Cloud Suite

NARAYAN CHANGDER
B. User interface
C. Utility Suite
C. Virtual connection
D. Office Suite
D. Remote access
384. Select all the types of secondary storage
379. Which sort of user is suited to using a A. RAM
command-line interface?
B. ROM
A. Software Tester
C. Hard Disk Drive
B. Network Technician
D. Cloud Storage
C. Programmer
E. Solid State Drive
D. Web Developer
385. Keeps track of stored files on com-
380. Which one of the following statements puter so they can be retrieved when
about OS is NOT true? needed.Which utility program refers to
A. Operating Systems are the interface this description?
between computer hardware and the user A. File Manager
B. The CPU can run multiple processes at B. Disk Cleanup
the same time C. File Compression Tools
C. A computer can support several appli- D. Spyware Remover
cations being open at the same time
E. Antivirus Program
D. Peripherals require software called
“drivers” in order for the OS to control 386. Most desktop and laptop computers to-
them day use this type of operating sys-
tem.Lesson 7-1
381. When two programs try to occupy the
same space in RAM, one or both may do A. real-time
this.Lesson 7-1 B. single-user/single-task
A. resolve C. single-user/multi-task
B. load D. multi-user
C. run 387. It is an online diary or commentary
D. crash A. Article
382. Which is NOT considered an operating B. Channel
system? C. Site
A. Windows D. Blog

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 111

388. User interfaces can be:Command Line In- 393. An example of software would be
terfaceGraphical User InterfaceSelect the
A. MS Power Point
description and examples for Graphical

PRACTICE BOOK» NOT FOR SALE


User Interface. B. keyboard
A. Text based C. monitor
B. E.g. DOS, Raspbian (for Raspberry Pi) D. printer

C. Contains Windows, Icons, Menus, 394. Which of the software below is best
PointersVisual suited for typing letters?
D. E.g. Windows 10, Windows 8, Android, A. Control program
Mac OS
B. Database
389. This is used in creating layout for a mag- C. Measuring program
azine.
D. Search engine
A. Word Processor
E. Word processor
B. Spreadsheet
395. Operating Systems will allocate sections
C. Desktop Publishing Program
of RAM to the processes as part of:(4-6)
D. None of the above A. Processor Management
390. High Level Languages (Python, VB, C#) B. File Management
need to be translated into before it can C. Peripheral Management
be executed by the microprocessor.
D. Memory Management
A. Machine Code
B. Mnemonics 396. What is Application Software?

C. Assemblers A. Software that manages the running of


the computer hardware and other soft-
D. Compliers ware

391. What happens when RAM is full? B. Specific purpose software used for
specific tasks
A. The computer crashes
C. Software that runs in the background
B. Virtual Memory is used of a computer system
C. An interrupt is raised D. None of the above
D. The computer explodes
397. Which of the following is not a “Manage-
392. Memory-management technique that ment” role of an operating system?
uses hard drive space as additional RAM A. Memory Management
A. Virtual Machine B. Peripheral Management
B. Virtualization C. File Management
C. Virtual Memory D. Audio Management
D. Virtualbox E. Process Management

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 112

398. Designed for mobile phones 403. Which of the following is not mobile op-
erating system?
A. Windows Mobile
A. Blackberry
B. Windows Embedded
B. Android
C. Android
C. Windows Phone
D. none of above
D. a-phone
399. What are the causes of data loss?

NARAYAN CHANGDER
404. Which of these are types of storage
A. Head crash
A. RAM
B. Malfunctions B. ROOM
C. Controller failure C. RUMMING
D. Virus attack D. ROM

400. System software is software which al- 405. What is the function of antivirus? (There
lows a computer to run and to be main- are two answers)
tained.The two main types of system soft- A. Protect computer against virus.
ware are and
B. Protect computer from bacteria.
A. PowerPoint
C. Damaging the computer program.
B. Utility software
D. Remove computer form viruses.
C. Operating system software
406. How much storage space do you need on
D. Application Software
your hard drive in order to install and use
an application successfully?
401. A hierarchy;
A. Just enough space to hold the program
A. is the means of carrying out opera-
files
tions or instructions
B. Applications never use any hard drive
B. are users of a system space
C. is software not fully understood by C. Enough space to hold the program files
most users and any data files you might produce
D. is a diagram where the most important D. Just enough space to hold your data
level of a system is at the top files

402. I plug my pendrive into the USB port. Au- 407. What is the function of the operating sys-
tomatically, the window popup with the tem that provides the user interface?
content inside of my pendrive. This pro-
A. A symbol that appears on the display
cess called
screen and that you move to select objects
A. coordinate tasks. and commands
B. driver. B. A program that controls a display for
the user (usually on a computer monitor)
C. plug and play.
and that allows the user to interact with
D. configure device. the system)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 113

C. A type of user interface which allows 412. Select a device which contains an embed-
people to interact with computer with im- ded system
ages rather than text commands

PRACTICE BOOK» NOT FOR SALE


A. Toaster
D. A single user/multitasking operating B. Kettle
system allows a single user to work on
two or more programs that reside in mem- C. Microwave Oven
ory at the same time D. Iron
408. Question 4:Dividing tasks so that the Op- 413. The file tab is used to save and print files
erating System appears to multitask is
A. True
dealtwith under:(4-6)
B. Not at all
A. Memory Management
C. Not Really
B. File Management
C. Processor Management D. False

D. Peripheral Management E. True

409. Which is NOT considered application soft- 414. This model is an iterative approach to
ware? software delivery that builds software in-
crementally from the start of the project,
A. Word instead of trying to deliver it all at once
B. Photoshop near the end.
C. Android A. the waterfall lifecycle model
D. Audacity B. Spiral model

410. Device drivers C. Agile modelling

A. allow peripherals to communicate with D. Extreme programming


the OS
415. The instructions in a form that the proces-
B. allow users to communicate with the sor can execute is called
OS
A. Machine Code
C. allow peripherals to work directly with
B. Assembly Language
the CPU
C. High Level Language
D. allow users to change settings of their
peripherals D. Complier

411. The software that runs on a computer 416. Question 3:A Virtual Machine is said to
that is responsible for the management of (7-9)
the computer. Provides user interface, file A. Allow the user to play games with Vir-
management, memory management, con- tual Reality Glasses
trols hardware, etc
B. Allow the user to virtually use an Oper-
A. Application software ating System
B. Operating system C. Allow a MAC to run on Windows
C. system software D. Hide the complexities of the hardware
D. control unit from the user

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 114

417. A small program that allows a specific pe- 422. Sorting, Formulas and Charts are all fea-
ripheral device to communicate with a com- tures of which type of software?
puter system A. Spreadsheet Software
A. Driver Programs B. Desktop Publishing Software (DTP)
B. Firmware C. Database Software
C. Operating System D. Presentation Software
D. none of above E. Word Processing Software

NARAYAN CHANGDER
418. An operating system that organizes and 423. This is the program that helps to boot
coordinates how multiple user access and up the computer. Usually stored on flash
share resources on a network. This de- memory so that it can be updated. Also al-
scription refers to lows settings such as boot order of disks
A. Mobile OS to be changed and saved by the user

B. Desktop OS A. Loader
B. BIOS
C. Server OS
C. Basic input output system
D. none of above
D. none of above
419. which of these is the fastest
424. to optimize the use of RAMWhich func-
A. magnetic tape tion of OS related to this description?
B. optical disk A. Providing user interface
C. HDD B. Controlling a network
D. memory card C. Managing programs
E. SSD D. Managing memory
420. protects your system from Trojans E. Starting and shutting the computer
and viruses
425. Booting is the process of starting or
A. Virus Scanner restarting a computer. What the process
B. System monitor involve?

C. Disk defragmenter A. Scheduling jobs


B. Configuring devices
D. none of above
C. Starting a computer
421. It involves looking at the program specifi-
D. Providing file management utilities
cation and creating a set of test data that
covers all the inputs and outputs and pro- 426. Which of the following tasks is NOT per-
gram functions formed by the operating system?
A. Functional testing A. managing computer memory
B. Black box testing B. managing the CPU
C. White box testing C. managing the formatting in a letter
D. Alpha testing D. managing input devices

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 115

427. Process of starting or restarting a com- B. Includes programs designed to help


puter. programmers

PRACTICE BOOK» NOT FOR SALE


A. Start the computer. C. Is used to control the operating sys-
B. Booting. tem

C. Cold computer. D. none of above

D. Warm computer. 433. Provides Internet connection. Wired con-


nectionsWireless connectionsWhich func-
428. To allow a user to interact with an Oper- tion of OS related to this description?
ating System-it must have a ? (1-3)
A. Monitoring Performance
A. User Connection
B. Providing file, disk and system man-
B. User Interface agement tools
C. Virtual Connection C. Establishing an Internet Connection
D. Remote Access D. Managing memory
429. Smaller files take up less E. Starting and shutting the computer
A. Storage place 434. An example of a menu interface is a
B. Load more quickly A. Pop-up
C. Streaming and downloading B. Pop-down
D. none of above C. Push-pull
430. Set of programs developed to perform D. Pull-up
specific tasks.
435. Allows users to copy, or backup, selected
A. System software files or the contents of an entire storage
B. Application software medium to another storage location.Which
utility program refers to this description?
C. Operating system
A. Restore Utility
D. Anti-Virus software
B. Disk Defragmenters
431. Aryan buy a new printer. If the new
C. File Compression Tools
printer attached to a computer, the
must be installed before the device can be D. Backup Utility
used. E. Antivirus Program
A. driver
436. These are programs that works with the
B. kernel operating system to allow communication
C. platform between a device and the rest of a com-
D. manager puter system
A. Antivirus
432. Which of the statements best describes
Application software? B. Utility software

A. Performs a specific task for computer C. Device Driver


users D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 116

437. Each device attached to your computer 442. This was one of the first operating sys-
has a special program called a(n) that tems ever written
enables the device and operating system A. Linux
to communicate with each other.
B. UNIX
A. device driver
C. Microsoft Windows
B. translator
D. Macintosh OS
C. interpreter

NARAYAN CHANGDER
D. device configurator 443. A type of utility program used to reduce
the size of a program is
438. It is the essential center of a computer A. a file compression program
operating system that serves as the core
that provides basic services for all other B. a troubleshooting program
parts of the OS. C. an anti-virus program
A. Shell D. an un-install program
B. File system 444. Windows is a scaled-down Windows
C. Kernel operating system designed for use on com-
D. none of above munications, entertainment, and comput-
ing devices with limited functionality.
439. Diving processor time between processes A. UNIX
so that they appear to multitask is known
as:(1-3) B. NetWare
A. Time Slicing C. Server 2008
B. Fish Slicing D. Embedded CE
C. Time waiting 445. A acts as a barrier between your com-
D. Idle Time puter and the internet. Checks which pro-
grams are trying to access your computer
440. Linux based OS developed by Open Hand- via the internet, or internet via your com-
set Alliance (including Google). puter.
A. Windows Mobile A. Anti-Virus
B. Windows Embedded B. Switch
C. Android C. Firewall
D. none of above D. Blockwall

441. What are the two broad categories of 446. This type of OS can be found on devices
computer software? such as printers, ATM’s and Cars. Usually
A. System Software ANDUtility Software. only has one job and is often designed for
specific hardware in mind.
B. Utility Software ANDApplication Soft-
ware. A. Real-time operating system

C. System Software AND B. Embedded system

D. Application Software ANDCAD, CAM C. Distributed operating system


Software. D. multi-tasking system

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 117

447. Fill in the blank the whole program 452. Which type of software would a game
one statement at a time. be?

PRACTICE BOOK» NOT FOR SALE


A. Compilers A. Utility software.
B. Interpreters B. An operating system.
C. Translators C. Application software.
D. none of above D. none of above

448. With a , users interact with menus 453. Allows the user to compress the size of
and visual images such as icons, buttons, large files for easier storage.
and other objects to issue commands. A. Compression Software
A. command-line interface B. Antivirus Software
B. menu-driven interface C. Computer games
C. performance-monitor interface D. Presentation applications
D. graphical user interface (GUI) 454. Question 2:The following is not a type of
Systems Software (4-6)
449. Which of the below is a definition of ‘Ap-
plication’ A. Device Drivers
A. General term for computer programs B. Utility Programs
B. Software designed to carry out a use- C. Applications
ful real-world task D. Operating Systems
C. A set of commands that a processor 455. State three types of Utility Program.
can recognise and act upon
A. Desktop OS
D. A combination of hardware and operat-
B. File Manager
ing system
C. Backup and restore Utility
450. Peripheral Management
D. Disk Defragmenters
A. Provides a method to communicate
E. Subject Directory
with the system
B. Manages your programs 456. Which one of the following is not a Utility
Program?
C. allows the os to manage the hardware
devices A. Disk defragmentation tool

D. Allows users to have different ac- B. Disk formatter


counts C. Web browser
D. Anti-Virus software
451. Which part of the operating system will
split the disk in storage sectors and decide 457. Used with mobile phones, GPS devices,
which sectors to write data to? and other mobile devices
A. Memory management A. iPhone OS
B. File and disk management B. Embedded Linux
C. User management C. Symbian OS
D. User interface D. BlackBerry Operating System

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 118

458. What is the first thing that happens when 463. Which is NOT a utility program?
a computer is switched on A. Word processor
A. Try and find and load the operating sys-
B. Compression software
tem
C. Back-up
B. Instructions perform some basic hard-
ware tests D. Disk organisation
C. Process of loading the operating sys-
464. Which file extension is correct for a Word

NARAYAN CHANGDER
tem is called booting the computer
document?
D. Computer looks for instructions to fol-
A. .xlsx
low (on ROM)
B. , doc
459. What lets you do many things, like write
book reports and stories? C. .pptx

A. Antivirus Software D. .png


B. Email E. .doc
C. Duct Tape 465. What is the purpose of a firewall in Secu-
D. Application Programs rity Management?

460. This interface requires the user to type in A. To prevent the execution of unautho-
codes or words rized programs on a computer

A. Command Line B. To scan and remove viruses from a


computer
B. Graphical
C. To manage the execution of processes
C. Menu Driven
on a computer
D. none of above
D. To check all incoming and outgoing net-
461. Type of scheduling algorithm where the work traffic on a computer
queue is sorted by expected execution
time. New jobs are added accordingly to 466. These are programs typically used to cre-
the queue. ate attractive, visually interesting presen-
tations
A. Shortest job first
A. Illustration programs
B. shortest remaining time
B. Presentation graphics
C. First come first served
C. Image Editor
D. Multi-level feedback queues
D. Adobe Photoshop
462. Select the functions of an operating sys-
tem from the list below. 467. What can an operating system do?
A. file management A. allow computer devices to work
B. storage management B. Allow hardware and software to com-
C. user interface municate
D. process management C. Make a computer run faster
E. Internet browser D. carry out operations

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 119

468. UNIX is an example of this type of oper- 474. Which type of utility program that works
ating system.Lesson 7-1 as a tool to reorganise files & unused
space on computer’s hard disk?

PRACTICE BOOK» NOT FOR SALE


A. real-time
B. single-user/single-task A. File manager
C. single-user/multitasking B. Defragmenter
D. multi-user C. Disk cleanup
D. Device driver
469. Expansion time variables are used
A. Before expansion of micro callsc.. 475. Which is NOT a resource the OS man-
ages?
B. only during expansion of macro calls
A. Processor
C. After expansion of micro calls
D. Any one of the above B. Memory
C. Input/Output
470. During macro expansion each statement
is replaced by D. Topology
A. the original program 476. Hardware is different from software be-
B. the sequence of assembly statement cause
C. by specific synbols A. you can see hardware
D. None of the above B. it costs more
C. hardware needs a person to make it
471. System Software:
work
A. Consists of the operating System.
D. a computer doesn’t need software to
B. performs a useful function. work
C. Is the outside of the computer.
477. What does the term” Defragmentation”
D. Controls the computer. mean?
472. Two types of system software are A. Putting the fragmented data together
A. application software and utility pro- B. Makes space on the HDD by getting rid
grams of any unused
B. Web browsers and application soft- C. Scans your computer for viruses.
ware
D. none of above
C. operating systems and utility pro-
grams 478. A screen causes a monitor’s screen to
display a moving image or blank screen if
D. operating systems and Web browsers
no keyboard or mouse activity occurs for
473. Application software consists of: a specified period of time.
A. Entertainment software A. manager
B. Productivity software B. saver
C. Speciality software C. utility
D. All of the above D. protector

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 120

479. The ability of an operating system B. Word processor


to switch between different applications C. Presentation software
stored in memory
D. Web authoring software
A. Diversion
484. What is the User Interface (UI)?
B. Multitasking
A. The part of the Operating System that
C. Operation
manages memory optimization
D. Programming
B. The part of the Operating System that

NARAYAN CHANGDER
480. These are programs that organize, ana- enables the user to interact with the sys-
lyze and graph numerical data such as bud- tem
gets and financial reports C. The part of the Operating System that
A. Database manages hardware devices

B. Suite D. None of the above

C. Utility 485. For a system which needs a guaranteed


response rate, you would use a OS:
D. Spreadsheet
A. Embedded
481. Reduce the size of files so they take up B. Real Time
less storage space on a storage medium or
can be transmitted faster over the Internet C. Distributed
A. File Compression Programs D. Multi-Tasking

B. Backup and recovery utilities E. Multi-User

C. Clean Up Utilities 486. Which of the following is a feature of a


utility program?
D. Security programs
A. It is unavailable to users.
482. Utility programs which included in
B. It is part of an integrated package.
most OS provide the following func-
tions:managing filesviewing imagesunin- C. It is written by application users.
stalling programs scanning disksDefrag- D. It is considered to be systems soft-
menting disks Backing up files and ware.
disksWhich function of OS related to this
description? 487. What part of the system software en-
ables multi tasking?
A. Monitoring Performance
A. Memory management
B. Providing file, disk and system man-
agement tools B. File management
C. Processor management
C. Establishing an Internet Connection
D. Peripheral management
D. Managing memory
E. Starting and shutting the computer 488. Which of the following ARE features of
user management for an Operating Sys-
483. What software would be used to create tem?
a website A. Different users can be given different
A. Image editing software access rights

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 121

B. New users can be given network ac- C. The OS is loaded into RAM
counts D. Configuration and customization set-

PRACTICE BOOK» NOT FOR SALE


C. Creating and managing passwords tings are checked
and usernames
493. What group do you use to insert Word
D. Files can be deleted, renamed and re-
Art?
organised
A. Text
489. These programs convert programming in-
B. Illustrations
structions written by programmers into a
language computers understand and pro- C. Paragraph
cess D. Text
A. Converter E. Text
B. Linguistic
494. Which software is designed to solve a
C. Translator specific problem or to do a specific task?
D. None of the above
A. Application Software
490. Which of the following is NOT a type of B. System Software
user interface?
C. Utility Software
A. Command-driven
D. User
B. Application programming interface
(API) 495. These runs single user applications and
C. Menu-driven shares files and folders on a small net-
work.
D. Graphical user interface (GUI)
A. Desktop OS
491. What is a definition of Operating Sys-
B. Virtualization
tem?
C. Mobile OS
A. A set of instructions that tell the com-
puters what to do D. Network OS
B. A software that performs specific func- 496. The purpose of memory is to optimize
tions for any business or industry the use of random access memory (RAM).
C. A hardware used to enter data and in- A. performance
structions by the user for example input
information in the computer B. management
D. A set of programs containing instruc- C. throttling
tions that coordinates all the activities D. integration
among computer hardware resources
497. You cannot use an operating system’s file
492. Which of the following is the first step in manager to
the boot process?
A. create new folders
A. The BIOS is activated by turning on the
computer B. delete files

B. The BIOS checks that all devices are C. shut down the computer
operational D. launch applications

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 122

498. Which of the following is NOT a software 503. This following is an example of a periph-
interface? eral?
A. Command-driven A. Processor
B. Touch screen B. Main Memory (RAM)
C. Menu-driven C. Hard Disk Drive
D. Graphical User Interface (GUI) D. ROM

NARAYAN CHANGDER
499. What does the scheduling management 504. [Select all appropriate answer]Example
system in Process Management ensure? of Application software
A. That each process has exclusive ac- A. Photoshop
cess to all computer resources B. Excel
B. That the computer is always running C. Word
the latest version of its operating system
D. Windows
C. That all processes have a fair use of
resources and that processes with higher E. All of these
priority are executed first
505. Certain computing projects in education
D. That all data on the computer is secure and science are free and maintained by a
and protected from unauthorized access diverse community of people. Their soft-
ware is usually distributed as:
500. Which of the following is not a text edi-
tor? A. open source

A. Tuxpaint B. charity

B. Sublime C. off the shelf

C. Visual Studio Code D. none of above

D. none of above 506. Memory in the CPU used to store used


data and data that will be used frequently
501. Question 8:Windows, Icons, menus and is called
Pointers are all part of this? (1-4)
A. Cache Memory
A. Graphical User Interface
B. Random Access Memory
B. Command Line Interface
C. Read Only Memory
C. Menu Interface
D. Virtual Memory
D. No User Interface
507. These coordinate computer resources and
502. Windows OS, Mac OS, Linus are exam- provides an interface between users and
ples of operating systems used for the computer and run applications
A. Laptop & Computers A. Operating systems
B. Tablets and Phones B. Utilities
C. Ipad and Iphones C. Device Drivers
D. none of above D. Translators

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 123

508. Search for and removes unneces- 513. Reverses the backup process and returns
sary/temporary files on computers and backed up files to their original form.
mobile.Which utility program refers to this Which utility program refers to this de-

PRACTICE BOOK» NOT FOR SALE


description? scription?
A. File Manager A. Restore Utility
B. Disk Cleanup B. Disk Defragmenters
C. File Compression Tools C. File Compression Tools
D. Spyware Remover D. Backup Utility
E. Antivirus Program E. Antivirus Program

509. What type of software am I? Spread- 514. Which of the following is a type of soft-
sheet software, e.g. Microsoft Excel ware?
A. Application programs
A. Operating System
B. Replicate programs
B. Application software
C. Logical programs
C. Utility software
D. Relative programs
D. none of above
515. Which of the following best describes a
510. Assembler is used as a translator for? command line interface?
A. Low level language A. It is made up of colourful icons to click
B. High Level Language on.
C. COBOL B. It is operated using special com-
mands.
D. C
C. It is operated by touching the screen
511. State two examples of Disk Defrag- with your finger.
menters program. D. none of above
A. Finder
516. in SIC One byte equals to how many
B. Spyware Doctor bits?
C. MyDefrag A. 4 bits
D. Windows Explorer B. 8 bits
E. Contig C. 12 bits
D. 16 bits
512. A(n) operating system is a complete
operating system that works on a desktop 517. software is privately owned soft-
computer, notebook computer, or mobile ware and limited to a specific vendor or
computing device. computer model.
A. multitasking A. Stand-alone
B. media-based B. Freeware
C. single-user C. Proprietary
D. stand-alone D. Shareware

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 124

518. is computer software that causes a 523. What are the two main categories of soft-
computer to perform useful tasks beyond ware?
the running of the computer itself. A. Operating Systems and Application
A. System software Software
B. Utility software B. System Software and Word Process-
ing Software
C. Application software
C. Application Software and Productivity
D. none of above Software

NARAYAN CHANGDER
519. Key job of the operating system. Al- D. None of the above
lows programs to be stored safely and ef- 524. A person who designs the programs in a
ficiently. Restricts each program to access- software package is called:
ing and amending its own area of data.
A. User
A. Processor scheduling
B. Software Manager
B. Interrupt service routines
C. System Developer
C. Memory management D. Software Programmer
D. Backing store management
525. What is Security Management in an oper-
520. A set of programs containing instructions ating system responsible for?
that work together to coordinate all the A. Managing the execution of programs
activities among computer hardware re- on a computer
sources. B. Controlling the amount of time a pro-
A. System Software cess has access to a computer’s re-
sources
B. Utility Software
C. Ensuring that antivirus software is up-
C. Operating System to-date and scanning regularly
D. Translator D. Creating and managing user accounts
on a computer
521. These enables users to collaborate on doc-
uments with other online. 526. Operating system developed in the late
A. Cloud Storage 1960s for midrange servers
A. Windows
B. Email
B. MAC OS
C. Cloud Computing
C. UNIX
D. All of the above
D. LINUX
522. Which of the following best describes li-
527. This programs organizes, analyzes, and
censing?
graphs numerical data
A. Official rules of rights to a program A. Presentation
B. A way to identify a program B. Word Processors
C. Car license plate attachment C. Image Editor
D. A form of coding D. Spreadsheet

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 125

528. Enables users to interact with a computer C. Saving data om a format that can be
system through windows, icons, menus read by different version of same applica-
and pointers. tion or new application. Menu option ‘Ex-

PRACTICE BOOK» NOT FOR SALE


A. application software port’ or ‘Save As’.
D. Opening or ‘reading’ data created in
B. system software
different version of the same application
C. Graphical user interface or new application.
D. Operating system 533. MS Word is an example of software
529. Select the true statements about operat- A. Presentation software
ing systems: B. DBMS software
A. A computer can only have one OS C. Spreadsheet software
B. The OS manages memory, storage, se- D. Word processing software
curity, printing and other useful functions
of the system 534. In which of the following file formats can
music files be compressed?
C. The OS provides a user interface
A. gif
D. All OSes allow you to use multiple pro-
B. jpeg
grams at once
C. mp3
530. The following is not a type of Systems D. mpeg
Software (4-6)
A. Device Drivers 535. What is the name of the default browser
that comes with the Macintosh Operating
B. Utility Programs System?
C. Applications A. Opera
D. Operating Systems B. Safari

531. Which of the following is NOT a definition C. Spotlight


of System Software? D. Firefox
A. Enables boot process 536. The application software used to create
B. Transfers files video, animations, sound and graphics.
C. Controls software configuration A. DBMS

D. Launches applications B. Multimedia software


C. Presentation software
532. Importing is when:
D. Desktop publishing software
A. Refers to the process of converting
(extracting) a compressed file back to the 537. There are four layer structures that in-
original size dicate where the operating system soft-
ware and application software are located.
B. File Explorer allows you to search for a What is the name of the first layer?
file based on certain criteria:file size, type
of file, partial file name, date accessed A. User
and even text in file B. Hardware

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 126

C. Application B. Allow the user to virtually use an Oper-


D. Operating System ating System
C. Allow a MAC to run on Windows
538. Which one of these is not System Soft-
ware? D. Hides the complexities of the hard-
ware from the user
A. Android
B. Norton Anti-virus 543. These operating systems control a single

NARAYAN CHANGDER
C. Apple macOS desktop computer
D. Office 365 A. Stand-alone operating system

539. The process of starting or restarting a B. Network operating system


computer is called bootingWhich function C. File compression program
of OS related to this description?
D. Embedded operating system
A. Providing user interface
B. Controlling a network 544. Full backup..
C. Managing programs A. Makes copies only of the new files
D. Managing memory
B. Saves your backup to secondary stor-
E. Starting and shutting the computer age
540. User interfaces can be:Command Line In- C. Makes copies of all files
terfaceGraphical User InterfaceSelect the
D. Only allows you to make a double copy
description and examples for Command
Line Interface.
545. Which of the following functions might be
A. Text based carried out by user management features
B. E.g. DOS, Raspbian (for Raspberry Pi) on an operating system? *choose all ap-
propriate answers*
C. Contains Windows, Icons, Menus,
PointersVisual A. Identifying which are users are on the
network
D. E.g. Windows 10, Windows 8, Android,
Mac OS B. Creating a default log-off time for all
users
541. An Operating System is
C. Monitor network usage by each user
A. Used for creating graphs and docut-
ments D. Create or change access rights for an
B. The most common type of system soft- individual user
ware
546. How would I open the Task Manager?
C. Only found in desktop computers
A. Shift+Alt+Del
D. All of these
B. Ctrl+Alt+Del
542. A Virtual Machine is said to
C. Ctrl+Enter+Del
A. Allow the user to play games with Vir-
tual Reality Glasses D. Ctrl+Alt+Enter

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 127

547. Exporting is when: 551. An Operating system is:


A. Refers to the process of converting A. hardware software that controls all ac-

PRACTICE BOOK» NOT FOR SALE


(extracting) a compressed file back to the tivities that take place in a computer
original size B. memory software that controls all ac-
B. File Explorer allows you to search for a tivities that take place in a computer
file based on certain criteria:file size, type
C. system software that controls all activ-
of file, partial file name, date accessed
ities that take place in a computer
and even text in file
D. storage software that controls all ac-
C. Saving data om a format that can be
tivities that take place in a computer
read by different version of same applica-
tion or new application. Menu option ‘Ex- 552. Which of these is not one of the three
port’ or ‘Save As’. main types of software?
D. Opening or ‘reading’ data created in A. Operating Systems
different version of the same application
or new application. B. Applications
C. Programming Languages
548. Which Operating System function allows
more than one program can run at the D. Media Players
same time? (4-5)
553. Which is not a computer translator?
A. Peripheral Management
A. Interpreter
B. Memory Management
B. Compiler
C. User Management
C. Word Processor
D. File Management
D. Assembler
549. Will Kim Jong Un meet Donald Trump?
554. The instructions for the microprocessor
A. There is a strong possibility have two parts. The two are called
B. No and

C. Donald Trump will meet North Korea’s A. opcode and operand


leader Kim Jong Un B. operator and opcode
D. North Korea is threatening to cancel C. instruction and data
President Donald Trump’s summit with
D. ant and dec
Kim Jong Un because of planned U.S. mil-
itary drills with South Korea. 555. Which of the software below is best
suited for storing records of books in a li-
550. Which bus sends the request to the RAM
brary?
requesting the next instruction to be exe-
cuted? A. Control program
A. Address Bus B. Database
B. Data Bus C. Measuring program
C. Control Bus D. Search engine
D. none of above E. Word processor

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 128

556. A type of software that lets you calculate 561. Compression is:
and organize numeric information. A. Additional data stored about a file
A. Database B. Property of file that can be set
B. Spreadsheet C. Basic information about files, name,
C. Presentation Software size and date modified
D. Process of reducing the size of a file
D. Graphics and Multimedia Software
562. Fill in the blank translate the whole

NARAYAN CHANGDER
557. Which of the following is NOT The role of program as an object code at once.
the operating system:
A. Compilers
A. Providing the user interface
B. Interpreters
B. Managing programs
C. Translator
C. Preventing basic security D. none of above
D. Managing hardware
563. When two programs try to occupy the
558. Solid state drives contain floating gates same space in RAM, one or both may do
to represent 1’s and 0’s. What are the ad- this
vantages to SSDs? (select all that apply) A. resolve
A. Fast access speeds B. load
B. Small, light and portable C. run
C. Quiet D. crash

D. No moving parts 564. During the execution phase in the CPU,


calculations may need to be performed.
E. Cheap
Which part of the CPU does this?
559. These represent the minimum hardware A. Arithmetic Logic Unit (ALU)
configuration required in order to success- B. Control Unit (CU)
fully install and run an application
C. Accumulator (ACC)
A. Drivers
D. Memory Address Register (MAR)
B. Software requirement
565. Which operating system is used for mo-
C. System requirement bile devices?
D. Hardware Specification A. Android
560. Describe the purpose of system utility B. Android and IOS
software C. Utility
A. Computer system maintenance D. Anti-virus
B. To keep personal infomation secure 566. What is an application?
C. Washing machine A. The apps you have on you phone
D. Lets the user interact with the com- B. Programs that are designed to per-
puter form a specific task

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 129

C. A form created by someone made to 572. A Virtual Machine is said to (7-9)


fill out
A. Allow the user to play games with Vir-

PRACTICE BOOK» NOT FOR SALE


D. none of above tual Reality Glasses
567. Programs and other operating informa- B. Allow the user to virtually use an Oper-
tion used by a computer is called ating System
A. Software C. Allow a MAC to run on Windows
B. Hardware
D. Hide the complexities of the hardware
C. Binary Code from the user
D. Peripherals
573. Question 1:What type of Software is
568. An operand is
needed to control the computer’s hard-
A. The operation to be performed on a set ware? (1-3)
of data
A. Programming Software
B. The data with which an operation is to
be performed B. Systems Software
C. Something which moves data around C. Application Software
the CPU
D. Bespoke Software
D. none of above
569. Which of the following are components of 574. System software consists of the program
the CPU ( select as many as appropriate) that controls the operations of the com-
A. Control Unit puter and its devices. Two types of sys-
tem software are ;
B. Buses
A. Microsoft Word and Windows 10
C. Arithmetic & Logic Unit
D. Dedicated Registers B. Utility programs and Windows

570. Which one is not a computer management C. Operating systems and utility pro-
software? grams
A. Operating system software. D. Operating system and application soft-
B. Device drivers. ware

C. System Utilities
575. Controls how users enter data and in-
D. Translator software structions and how information is dis-
played on the screen. Which function of
571. Which one is true about Open source soft-
OS related to this description?
ware from the following?
A. It is very expensive. A. Providing user interface
B. It is made to make profit. B. Controlling a network
C. It made for the betterment of other C. Managing programs
people.
D. Managing memory
D. Well tested and reliable and updates
will be regularly be issued. E. Starting and shutting the computer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 130

576. This operating system is designed to run B. Time Capsules


on computers made by Apple.Lesson 7-2
C. File History
A. Linux
D. Carbonite
B. UNIX
C. Microsoft Windows 582. An application designed to be down-
loaded to a handheld device.
D. Macintosh OS
A. system unit

NARAYAN CHANGDER
577. The two major types of system software B. malware
programs are utility programs and the
C. mobile app
A. supervisor programs
D. Instagram
B. application software
C. user interface 583. Non-modifiable procedures are called?
D. operating system . A. concurrent procedures

578. Which of the following is an Output de- B. serially usable procedures


vice? C. reentrant procedures
A. Printer D. topdown procedures
B. Mouse
584. A type of software that allows you to cre-
C. Microphone ate, play, and edit photo, audio, and video
D. Keyboard files.

579. Which of the following is not type of Ap- A. Database


plication Software B. Presentation Software
A. Spreadsheet C. Word Processor
B. Word Processing D. Graphics and Multimedia Software
C. Presentation
585. A hard disk drive contains
D. Database
A. disks
580. Select all the application software:
B. platters
A. Spreadsheets
C. CDs
B. Word Processors
D. no moving parts
C. Browsers
D. Operating System 586. If an OS has to the ability to run more
than one program simultaneously what is
E. Anti-Virus this called? (1-3)
581. The utility automatically creates du- A. Multihandling
plicates of your libraries, desktops, con-
B. Multitasking
tacts, and favorites to another storage lo-
cation. C. Multiuser
A. System Restore D. Multiprogram

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 131

587. Amin buys a new computer with an op- C. The original file can be re-created from
erating system and some utilities.State the compressed file
two functions of the operating sys-

PRACTICE BOOK» NOT FOR SALE


D. Turning the text into a format that only
tem.Answers:4 a reader with a key can decrypt it
A. Provides interfaces between user and
computer / Determines look and feel of 592. Which part of the operating system will
the computer remove data that is no longer needed to
free up space for other programs being
B. Provides a platform for software to used?
run
A. Memory management
C. Manages peripherals used by the sys-
tem B. File and disk management
D. Manages memory C. User management
E. Operates the system D. User interface

588. A(n) interface controls how users en- 593. Linux is software, which means its
ter data and instructions into a computer code is provided for use, modification, and
and how information is displayed on the redistribution.
screen. A. open source
A. control B. client/server
B. utility C. upgradable
C. user D. multitasking
D. management
594. Each platter on a magnetic hard drive is
589. What is an Operating System? broken down into tracks. What part of the
track is data stored into?
A. Physical parts of a computer
A. Section
B. A keyboard
B. Sector
C. A videogame
C. Track Segment
D. Software that let a user work with a
computer D. Quadrant

590. These are programs that perform specific 595. Choose the Microsoft operating system
tasks related to managing computer re- A. Windows
sources
B. Android
A. Application Software
C. Linux
B. Antivirus
D. Mac OS X
C. Virtualization
D. Utility Software 596. A complete operating system that works
on a personal computer (such as desktop
591. Lossy compression is ? and notebook computers)This description
A. Usually performed on text refers to

B. When some original data is lost and A. Mobile OS


the original file cannot be re-created B. Desktop OS

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 132

C. Server OS 602. software, such as operating systems


D. none of above and utility programs, consists of the pro-
grams that control or maintain the opera-
597. What software would be used to make tions of a computer and its devices.
calculations A. System
A. Image editing software B. Application
B. Spreadsheet C. Management

NARAYAN CHANGDER
C. Desktop Publishing (DTP) software D. Program
D. Web authoring software
603. Which of the following is designed to con-
598. C:denotes a(n) directory that is at the trol the operations of a computer?
top of the filing structure of a computer. A. Application Software
A. sub B. System Software
B. cluster
C. Utility Software
C. root
D. User
D. domain
604. is designed to solve a specific prob-
599. Define multiprocessing. lem or to do a specific task.
A. Allows a single user to work on two or A. Application Software
more programs at the same time.
B. b) System Software
B. Allows only one user to run one pro-
C. c) Utility Software
gram at a time.
D. d) User program
C. Supports two or more processors run-
ning programs at the same time. 605. Assess and report information about vari-
D. Enables two or more users to run pro- ous computer resources and devices.Which
gram simultaneously. function of OS related to this description?
A. Monitoring Performance
600. A(n) utility allows users to copy se-
lected files or an entire hard disk to an- B. Providing file, disk and system man-
other storage medium. agement tools
A. copy C. Establishing an Internet Connection
B. restore D. Managing memory
C. safeguard E. Starting and shutting the computer
D. backup 606. State two examples of Backup and Re-
601. Software that controls all of the comput- store utility program.
ers hardware is A. Finder
A. Program Software B. Spyware Doctor
B. Application Software C. Time Machine
C. Instructional Software D. Backup and Restore
D. System Software E. Contig

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 133

607. A full-featured software that can run C. Can be very confusing to a beginner
complex software like a word processor D. none of above
or spreadsheet.

PRACTICE BOOK» NOT FOR SALE


A. Application 612. Software is used to control hardware de-
vices and allow an OS use the hardware
B. Apps
C. Software Program A. Device Management

D. Operating System B. Device Driver


C. Device System
608. Question 9:Operating Systems will allo-
cate sections of RAM to the processes as D. Hardware Peripheral Device
part of:(4-6)
613. looks at your current system re-
A. Processor Management sources
B. File Management
A. Disk defragmenter
C. Peripheral Management
B. Virus Scanner
D. Memory Management
C. System monitor
609. Dividing tasks so that the Operating Sys- D. none of above
tem appears to multitask is dealt with
under:(4-6) 614. With a graphical user interface (GUI), you
A. Memory Management can
B. File Management A. see the graphic of the computer.
C. Processor Management B. interact with menu and images.
D. Peripheral Management C. play with the games.
610. How does Process Management allow D. interfere the graphic.
the computer to appear to be multitask-
615. This is a utility program of Windows Op-
ing?
erating System that removes unnecessary
A. By executing multiple applications at files
the same time
A. File History
B. By switching between applications
quickly and efficiently B. Disk Cleanup
C. By giving each application exclusive ac- C. Optimize Drives
cess to all computer resources D. Defragmenter
D. By executing only one application at a
time, but with higher priority for certain 616. A black box;
applications A. is instructions that control processing
611. Below are 2 advantages and 1 disadvan- B. is software not fully understood by
tage for Command Line Interface.Choose most users
the disadvantage C. are programs or sets of instructions
A. Takes up less memory D. are physical units that make up a sys-
B. Takes less processing power tem

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 134

617. State three (3) examples of Desktop OS. B. Haiku


A. Disk Operating System (DOS) C. Windows
B. Android OS D. Android
C. Mac OS 623. What is the purpose of Anti-Virus soft-
D. Windows ware?
E. NetWare A. To keep the computer safe from mali-
cious software

NARAYAN CHANGDER
618. Question 7:To allow a user to interact B. To keep people safe from other people
with an Operating System-it must have a
C. To keep the computer safe from de-
? (1-3)
fragmantation
A. User Connection
D. To keep data safe
B. User Interface
624. These allows the devices to communicate
C. Virtual Connection with the operating system of the computer
D. Remote Access A. Operating system
619. Which of these is an example of an oper- B. Utilities
ating system? C. Device Drivers
A. Window D. Translators
B. Word 625. For a simple system with very limited
C. Excel processing power, you would use a
OS:
D. PS3
A. Embedded
620. Software written to meet the need spe- B. Real Time
cific need of a company is
C. Distributed
A. special purpose software
D. Multi-Tasking
B. integrated software
E. Multi-User
C. general purpose software
626. Metadata is:
D. custom written software
A. Additional data stored about a file
621. An example of multitasking is B. Property of file that can be set
A. doing a background save while typing C. Basic information about files, name,
a document size and date modified
B. allowing many users to use the same D. Process of reducing the size of a file
program
627. I use what application to go to web-
C. allowing one user to use one program pages?
D. opening one program by many users A. Wifi
622. Which of these are examples of Operat- B. Internet Explorer / Firefox
ing system? C. Google Chrome/Safari
A. WinZip D. Ethernet Cable

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 135

628. A computer program that controls a par- C. Applications


ticular device that is connected to your
D. Operating Systems
computer for configuration?

PRACTICE BOOK» NOT FOR SALE


A. Operating System 634. These are operating systems that are en-
B. Middleware tirely stored within a device

C. Device Drivers A. Stand-alone operating systems


D. Utility Software B. Network operating systems

629. The 2 types of Software are: C. Embedded operating systems

A. Operating System D. None of the above


B. System 635. Types of application software:
C. Business
A. Business
D. Application
B. Operating System
630. It is an interconnection of multiple de- C. Robotics
vices, also known as hosts?
D. Educational
A. Computer Network
E. Computer Games and Environment
B. Open System
C. Close Sytem 636. Encryption
D. Protocol A. Jumble up a message
631. This type of visual display lets you use a B. Saves your file to secondary storage
mouse to interact with the workspace on
C. Translates a file into binary
the computer screen.Lesson 7-1
D. Reduces the size of a file
A. graphical user interface (GUI)
B. desktop 637. Which of these NOT popular to be use in
C. operating system Desktop?
D. BIOS A. Windows OS

632. Who Will Walk Meghan Markle Down the B. Blackberry OS


Aisle at the Royal Wedding? C. IOS
A. Thomas Markle Sr D. Linux OS
B. her close friend, Jessica Mulroney E. Windows 10
C. Meghan would walk herself
638. The Operating System is a:
D. Doria Ragland her mother
A. System Software
633. The following is not a type of Systems
Software B. Application Software
A. Device Drivers C. Utility Software
B. Utility Programs D. Malware

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 136

639. Which Operating System function en- C. Mobile OS


ables allocation of folders? (1-3) D. Network OS
A. User Interface
644. These are programs typically used to cre-
B. Memory Management
ate sophisticated commercial websites.
C. User Management
A. Game Design Programs
D. File Management
B. Presentation Graphics

NARAYAN CHANGDER
640. The physical objects that make up the C. Illustration Programs
computer system:
D. Web Authoring Programs
A. Software
B. Storage 645. Below are 2 advantages and 1 disadvan-
tage for Graphical User Interface.Choose
C. Input
the disadvantage
D. Hardware
A. The user doesn’t need to memorise the
641. Which of the software below is best commands
suited for an automatic washing ma- B. Simple to use for beginners
chine?
C. Takes up a lot of processing power and
A. Control program memory
B. Database D. none of above
C. Measuring program
646. what does OS stand for
D. Search engine
A. One Second
E. Word processor
B. Operating System
642. What are the TWO things the Task Man-
C. One Stand
ager does?
A. Provides some information about the D. Only Segment
computer’s performance and the applica-
647. What type of Software is needed to con-
tions and processes running.
trol the computer’s hardware? (1-3)
B. Helps you find the missing documents
A. Programming Software
scattered all over the hard-drive of the
computer. B. Systems Software
C. Gathers information on the processing C. Application Software
and compiling of modern documents and D. Bespoke Software
related aspects.
D. Most often used to terminate a pro- 648. Optical disks use and to represent
cess or program that is not responding. the digits 0 and 1.
A. pits and lands
643. These are used to control and coordinate
computer that are linked together. B. flats and dips
A. Desktop OS C. ups and downs
B. Virtualization D. ants and decs

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.2 System Software 137

649. is an electronic component that store 654. State three (3) examples of Mobile OS.
instructions waiting to be executed by the
A. BlackBerry OS
processor

PRACTICE BOOK» NOT FOR SALE


B. Android OS
A. Random fetching memory
C. UNIX
B. Random execute memory
D. iOS
C. Random access memory
E. NetWare
D. Random devices
655. Software is split into categories.
650. A good antivirus software will deny any
access to unauthorised users.Choose the A. 4
best synonym of the underlined word.
B. 3
A. not allow
C. 2
B. resume
D. none of above
C. permit
D. update 656. A type of specialized suite that includes
a variety of programs designed to make
651. What type of back-up is quicker to re- computing easier and safer.
store from? A. System software
A. Incremental B. Application software
B. Differential C. Utility
C. Full D. None of the above
D. Fragmented
657. Emulated computer environment that sim-
652. Which of the following components or pe- ulates hardware and can be used for
ripherals might be listed in the minimum running OS’s separate from the physical
requirements for an application? (host) computer. Replicates the function-
ality of a physical machine
A. Video system
A. Multi-tasking machine
B. CD drive
B. Physical machine
C. Network connection
C. Virtual machine
D. All of these may be part of the mini-
mum requirements for some application D. Multi user machine

653. Utility Programs that:Recover corrupted 658. A statement declare the name of
/ accidentally deleted data macro.
A. Program Uninstaller A. macro prototype
B. Disk Scanning Program B. macro definition
C. Backup Utility C. macro identification
D. Data Recovery Utility D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Boot Process 138

659. Which is faster to restore? 660. This operating system is installed on


more than 90 percent of personal comput-
A. Full Backup ers.Lesson 7-2
B. Incremental Backup A. Linux
C. Only one backup needs to be restored B. UNIX

D. The full back up needs to be restored C. Microsoft Windows


first then each incremental backup D. Macintosh OS

NARAYAN CHANGDER
2.3 Boot Process
1. Where is the MBR located on the HDD 5. Operating systems is also known as
A. On the first sector in the HDD A. Database
B. Anywhere on the HDD B. System software

C. On the RAM of the HDD C. Hardware


D. Printer
D. On the ROM of the HDD
6. The core of the operating systems is
2. *startup sequence that starts the operat-
ing system of a computer when it is turned A. Unix
on is called as B. Kernel
A. Booting C. Command.com
B. Bootloader D. CHKDSK

C. BIOS 7. Select statements that are true about


BIOS?
D. GRUB
A. BIOS loads MBR
3. What could cause a fixed disk error? B. Stands for Basic Input Output System
A. No-CD installed C. BIOS runs a hardware test called
B. Bad RAM POST
D. It is a legacy motherboard firmware.
C. Slow processor
D. Incorrect CMOS settings 8. Trouble shooting is
A. The process of solving a problem.
4. You just installed a new IDE hard drive, but
B. It involves the process of elimination
your system BIOS will not recognize the
new drive, what should you check first. C. follow a set of steps to determine the
problem and resolve the problem
A. cable sequence
D. creating problems
B. jumpers on the hard drive
9. About 99 percent of the BIOS business is
C. drivers that need to be loaded
controlled by two companies. Of the fol-
D. .hard drive manufacturer web site in- lowing, which one is not a major BIOS man-
formation ufacturer?

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Boot Process 139

A. Intel 14. During the normal PC boot process, which


B. American Megatrends (AMI) of the following is active first?

PRACTICE BOOK» NOT FOR SALE


C. Award Software A. RAM BIOS

D. Phoenix Technology B. CMOS


C. ROM BIOS
10. what is the correct order of the BOOT-
MGR controls several startup:1. WinLoad D. Hard disk information
loads two files that make up the core of
15. What do you press on the HP com-
Windows:NTOSKRNL.EXE and HAL.DLL.2.
puter keyboard in order to open the BIOS
WinLoad reads the Registry files, chooses
screen?
a hardware profile, and loads the device
drivers.3. WinLoad (WINLOAD.EXE) uses A. F6
the path specified in BOOTMGR to find the B. Esc
boot partition.
C. F2
A. 1, 2, 3
D. Tab
B. 3, 2, 1
C. 3, 1, 2 16. the BIOS locates and reads the configura-
tion settings that are stored in the
D. 2, 3, 1
memory.
11. The following process determines the A. BIOS
amount of memory present, the date/
B. BOOTMGR
time, and which communications ports and
display adapters are installed in a micro- C. CMOS
computer? D. none of above
A. Start-up utility test
17. The provides information about hard-
B. Power on Self Test ware installation, configuration and hard-
C. Power up boot process ware status
D. Power on start up process A. Device Manager

12. When does BIOS run? B. Control panel

A. Runs after Windows loads C. Add new hardware

B. Runs before you shut down D. Program manager

C. Runs after you log in 18. You get a CMOS checksum error during
D. Runs before Windows loads bootup. What is most likely the cause this
error?
13. POST stands for A. power supply is bad
A. point of service test B. b.BIOS needs updating
B. power on self test C. CMOS battery is nearing end of life
C. power off self test D. hard drive types are incorrectly de-
D. none of above fined

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Boot Process 140

19. What is BIOS? (POST)4.Load the Shell/GUI (DOS


A. Software (Firmware) that intercon- Prompt)
nects the computers’ hardware A. 1, 2, 3, 4
B. Hardware that lets the heat out of the B. 2, 3, 4, 1
computer C. 3, 2, 1, 4
C. Computer’s permanent storage D. 3, 1, 2, 4
D. Computer’s temporary storage
25. Once the initial diagnostics are performed

NARAYAN CHANGDER
20. What does the MBR contain? and assigning system resources, the
startup BIOS program will check for infor-
A. Boot Loader
mation about secondary storage devices
B. BIOS that might contain the OS. This list of de-
C. Device Setting vices and the order in which they should
be checked are found and arranged in the
D. OS
CMOS setup utility, and are commonly re-
21. Select Multiple:What is the Runlevel usu- ferred to as:
ally set as? A. The Boot Record
A. 2 B. The Boot sequence
B. 3 C. The MBR (Master Boot Record)
C. 4 D. The Disk Partition table
D. 5 26. Check all Hardware in the following op-
22. What are the different phases of the boot tions
process? A. HDD
A. BIOS → GRUB → Kernel → MBR → B. ROM
Init C. RAM
B. BIOS → MBR → GRUB → Kernel → D. Boot Loader
Init
E. BIOS
C. BIOS → GRUB → MBR → Init → Ker-
nel 27. When launching Windows Virtual PC appli-
cation a technician receives an error mes-
D. BIOS → Kernel → Init
sage that the Hardware-Assisted Virtual-
23. Which of the following is not a multitask- ization (HAV) feature is not enabled on the
ing operating system? computer. Which steps might help to fix
the problem?
A. Windows
A. Safe mode troubleshooting
B. Linux
B. Re-install the Windows Virtual PC ap-
C. Win NT plication
D. DOS C. Get into the CMOS setup utility and en-
24. What is the correct boot process or- able the virtualization technology setting
der? 1.OS Initializing itself2.Loading D. Increase the amount of physical RAM
the OS3.BIOS checking hardware on the system

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Boot Process 141

28. MBR stands for C. the location of a device that is ready to


A. Master Boot Record boot when the computer is turned on

PRACTICE BOOK» NOT FOR SALE


B. Master Bootloader Record D. none of above

C. Mater Booting Read 34. Where do modern PCs store CMOS set-
D. Master Boot Read tings?
A. .BIOS
29. BIOS stands for
B. Flash ROM
A. Basic Input Output System
C. NVRAM
B. Basic Input Out-process System
D. Southbridge
C. Basic Inside Outside system
D. Both A and B 35. POST(power on self Test) checks all of the
following except:
30. Where is BIOS stored?
A. modem
A. On the RAM
B. memory
B. On the Motherboard ROM
C. CPU
C. On the GPU
D. video
D. in the CPU
36. What is Firmware?
31. the cold boot means
A. Software that is generally stored on a
A. slow booting of the computer when Flash ROM part of the hardware.
turned on
B. Software that is used specifically for
B. begginng the boot process by turning the device it is part of.
off the computer system
C. Software that is part of the hardware.
C. beggining the boot process by turning
D. All of the above.
on the computer.
D. none of above 37. The Correct Boot Sequence is
A. Power on-BIOS-POST-Boot Strap
32. During boot-up, the memory test:
Loader-MBR-kernel (OS)-Login screen
A. Is a superfluous step that should be ig-
B. Power on-BIOS-POST-MBR-kernel
nored
(OS)-Boot Strap Loader-Login screen
B. Checks and verifies that contiguous
memory is installed C. Power on-POST-MBR-BIOS kernel
(OS)-Boot Strap Loader-Login screen
C. Is an operational error
D. Power on-BIOS kernel (OS)-POST-
D. Displays what memory is installed, but MBR-Boot Strap Loader-Login screen
nothing else
38. Noise cannot be created due to
33. The boot device priority is
A. Monitor
A. the order in which the devices are lo-
cated B. HDD

B. the order in which devices are checked C. ODD


to locate the bootable partition D. Antivirus software

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.3 Boot Process 142

39. A causes more stress on the system. C. Main Batch Record


A. Cold Boot D. Main Bad Record
B. Warm Boot 45. Which chip contains the system BIOS and
C. Short Boot can hold data permanently, even without
D. Restore electricity?
A. Flash ROM
40. When you use the Power switch to restart
B. NVRAM

NARAYAN CHANGDER
it is called a
A. Cold Boot C. RAM

B. Warm Boot D. ROM


C. Short Boot 46. Select statements that apply to UEFI?
D. Restore A. Modern motherboard firmware.
41. From where can the boot option be se- B. It has a secure option and generally
lected? boots faster.
A. Advanced BIOS Features C. Works with both MBR and GPT
B. Advanced Chipset Features D. It uses a special EFI System partition
to store boot loaders and services needed
C. CPU Soft menu
for boot.
D. Power management Setup
47. Most PCs give a single beep on boot-up to
42. Select Multiple:What is a Device Driver? indicate they are OK hardware wise. You
A. Software that acts as a translator be- boot your PC and don’t get a beep. What
tween the hardware and programs/OS us- should you check first?
ing it. A. system board
B. A special hardware device which en- B. RAM
ables communication with software.
C. microprocessor
C. It is different for each OS.
D. speaker
D. Software used to virtualize hardware
devices. 48. Boot Strap process is
A. Load system files to RAM
43. In ROM BIOS, the acronym BIOS stands
for: B. Checks the computer connections
A. Basic Intuitive Output Set C. Clean up the computer memory
B. Basic Input Organizational System D. Prepare the computer ready
C. Basic Input Output System 49. Which phase mounts the root file system?
D. Basic Industry Operating System A. BIOS
44. What is MBR acronym stand for B. GRUB
A. Master Boot Record C. Init
B. Main Boot Record D. Kernel

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


2.4 Windows Boot 143

50. Select the two places specific parameters D. Load the Shell/GUI (DOS Prompt)
of a new device are stored after replac-
ing a modular hardware component inside 52. From what location are the 1st computer

PRACTICE BOOK» NOT FOR SALE


computer case. instructions available on boot up?

A. System BIOS A. ROM BIOS

B. CMOS B. boot.ini

C. Startup BIOS C. CONFIG.SYS

D. Secondary storage D. CPU

51. What is the first Step when cold booting a 53. Fault can be
machine? A. An error
A. OS initializing itself B. Corrupted disk
B. Loading the OS C. Failure to function
C. BIOS checking hardware (POST) D. Enact disk

2.4 Windows Boot


1. You have booted your Windows worksta- D. Boot Loader
tion in Safe Mode and enabled boot log-
4. Marcus was attempting to edit some reg-
ging. To which log file is the boot logging
istry settings on his Windows 11 system.
information now written?
Now, when he tries to boot his system, it
A. Ntbtlog.txt hangs after the Windows splash screen is
B. Bootlog.txt displayed.Because he cannot boot to Safe
C. Boot.log Mode, he boots the system from the Win-
dows installation disc and accesses the Re-
D. none of above
covery Environment.Which Recovery op-
2. You experience startup errors after you tion should Marcus use FIRST to help re-
install a new device.What should you do solve his boot issue?
FIRST to resolve the issue? A. System Restore
A. Boot in Safe Mode and disable all un- B. System Restore
necessary devices.
C. System Restore
B. Boot in Safe Mode and roll back the
D. System Restore
driver.
C. Recover the system image. 5. Your system hangs immediately after the
BIOS information is shown and displays an
D. none of above
error loading operating system error mes-
3. Which option is the first process that runs sage.What is the MOST likely source of
once a computer is powered on and the the problem?
CPU loads the BIOS? A. Inaccessible boot disk
A. Winload.exe B. Corrupt MBR or partition table
B. WININIT C. Corrupt boot sector
C. POST D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3. Processes

NARAYAN CHANGDER
3.1 Process Concept
1. is not a multi user operating system. B. memory management
A. UNIX C. file management
B. WINDOWS D. disk management
C. LINUX 4. ) Which of the following is an appropriate
D. DOS description concerning the OS for PCs?
A. Each PC allows only one (1) type of OS
2. ) Which of the following is an appropriate to be installed and run on it.
description concerning a CPU?
B. Each PC allows only one (1) type of OS
A. The cache memory that is integrated to be installed and run on it.
into a CPU is used to virtually extend the
C. When an OS is upgraded to a new ver-
B. A CPU is equipped with the arithmetic sion, all of the software operating with the
and logical function that serves as part of old
C. A CPU is categorized as a 16-bit, 32- D. There exist some OSs for PCs that can
bit, or 64-bit CPU depending on the data be started up by using an external storage
volume
5. ) When the types of programs that are ex-
D. For CPUs that have the same architec-
ecuted when a PC is started are broadly
ture, the higher the clock frequency, the
classified into three categories, namely
faster
BIOS (Basic Input Output System), OS, and
3. Dynamically allocating portions of primary resident application program, which of the
storage to programs at their request, and following is the order of execution of the
freeing it for reuse when no longer needed programs?
including dynamically moving programs A. BIOS, OS, resident application pro-
between secondary and primary storage gram
when needed B. OS, BIOS, resident application pro-
A. processor management gram

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.1 Process Concept 145

C. OS, resident application program, C. Operating System


BIOS
D. Boot System

PRACTICE BOOK» NOT FOR SALE


D. Resident application program, BIOS,
OS 11. The address of the next instruction to be
executed by the current process is pro-
6. What language do operating systems vided by the
use?
A. CPU registers
A. The operators language
B. Program counter
B. Binary Code
C. Code C. Process stack

D. XOXO D. Pipe

7. Left, Center, Right, and Justify are options 12. I am writing a new operating system and
for which tool located on the toolbar or rib- begin implementing some processor man-
bon? agement. Which of the three below under-
pins the others and so should be the one I
A. Zoom
start work on first?
B. Line Spacing
A. multi-programming
C. Bulleted Lists
B. multi-tasking
D. Text Alignment
C. multi-processing
8. ) The strategy of making processes that
D. none of above
are logically runnable to be temporarily
suspended is called
13. ) A memory connected to a microproces-
A. Non preemptive scheduling sor has 20 address lines and 16 data lines.
B. Preemptive scheduling What will be the memory capacity?
C. Shortest job first A. 8 KB
D. First come First served B. 2 MB

9. ) Which of the following algorithms tends C. 16 MB


to minimize the process flow time? D. 64 KB
A. First come First served
14. ) The types of programs that are executed
B. Shortest Job First at the startup time of a PC are generally
C. Earliest Deadline First classified into three categories:BIOS, OS,
D. Longest Job First and startup services. Which of the follow-
ing is the list that is arranged in the se-
10. Which of the following is a set of programs quence of the execution of the programs?
containing instructions that coordinate all A. BIOS → OS → Startup services
the activities among computer hardware
resources? B. OS → BIOS → Startup services
A. Management System C. OS → Startup services → BIOS
B. Disk Base System D. Startup services → BIOS → OS

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.1 Process Concept 146

15. The ability for an operating system to give C. More expensive


the appearance to manage the allocation D. Bad reviews
of different processes to multiple proces-
sors/cores 21. A(n) is the most important software
that runs on a computer.
A. multi-programming
A. Operating System
B. multi-tasking
B. Windows
C. multi-processing
C. Anti Virus

NARAYAN CHANGDER
D. multi-plying
D. iOS
16. Which of the following is the most recent
version of Windows? 22. ) Which of the following is a special-
purpose register of microprocessor?
A. Windows 8
A. Program counter
B. Windows 7
B. Instruction register
C. Windows 10
C. Accumulator
D. none of above D. Temporary register
17. This is not a operating system 23. What is the degree of multiprogramming?
A. Batch A. the number of processes executed per
B. Online unit time
C. Time sharing B. the number of processes in the main
memory at any point
D. Random
C. the number of processes in the I/O
18. This is not called equvalent of a process.. queue
A. Job D. none of above
B. Program 24. ) The portion of the process scheduler in
C. Task an operating system that dispatches pro-
cesses is concerned with
D. Archive
A. assigning ready processes to CPU
19. ) Which is the most optimal scheduling al-
B. assigning ready processes to waiting
gorithm?
queue
A. FCFS-First come First served C. assigning running processes to
B. SJF-Shortest Job First blocked queue
C. RR-Round Robin D. all of the mentioned
D. None of the mentioned 25. Which of the following is NOT a desktop
operating system?
20. What is one reason there is a greater per-
centage of Windows users than Mac OS A. OS X
X? B. Windows
A. Not as good C. Chrome OS
B. Do not meet the individual needs D. Google Android

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.1 Process Concept 147

26. ) What is FIFO algorithm? B. Linux


A. first executes the job that came in last C. IBM

PRACTICE BOOK» NOT FOR SALE


in the queue D. none of above
B. first executes the job that came in first
in the queue 32. The screen that you see when your com-
puter has finished starting up is called the
C. first executes the job that needs mini-
mal processor
A. Task Bar
D. first executes the job that needs mini-
mal processor B. Start up screen
C. Home
27. ) Which of the following is correct about
8086 microprocessor? D. Home Screen/Desktop
A. Intel’s first x86 processor 33. ) What does a microprocessor understand
B. Motrola’s first x86 processor after decoding opcode?
C. STMICROELECTRONICS’s first x86 pro- A. Perform ALU operation
cessor B. Go to memory
D. NanoXplore x86 processor C. Length of the instruction and number
of operations
28. If p1= 4, p2= 12, p3 = 34, p4= 2.In SJF
chance will be for process D. Go to the output device
A. p1 34. ) Which of the following addressing mode
B. p2 is used by 8085 microprocessor for array
and list operations?
C. p3
A. Base-Register
D. p4
B. Direst
29. What is a Process Control Block?
C. Indexed
A. Process type variable
D. Immediate
B. Data Structure
C. A secondary storage section 35. Allocating time on the processor to individ-
ual processes is known as
D. A Block in memory
A. CPU Scheduling
30. Which of the following is not the state of B. CPU Timing
a process?
C. CPU Clocking
A. New
D. CPU Sorting
B. Old
C. Waiting 36. Google Docs or Microsoft Word allows you
to:
D. Running
A. create, edit, share and store forms for
31. Recycle Bin to Windows is what Trash Can user input.
is to B. create, edit, share and store web-
A. Mac pages and sites.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.1 Process Concept 148

C. create, edit, share and store spread- C. 50H, 50H


sheet documents.
D. 60H, 40H
D. create, edit, share and store word-
processing documents. 42. When you save your document to your
computer, where is it stored?
37. FCFS is
A. in the cloud
A. First come first set
B. in a folder
B. First come final set

NARAYAN CHANGDER
C. First come first serve C. on the Internet

D. First come first start D. on a hard drive

38. Suppose that a process is in “Blocked” 43. ) What is Scheduling?


state waiting for some I/O service. When
A. allowing a job to use the processor
the service is completed, it goes to the:
B. making proper use of processor
A. Running state
B. Ready state C. all of the mentioned

C. Suspended state D. none of the mentioned


D. Terminated state 44. ) Which of the following scheduling al-
gorithms gives minimum average waiting
39. What program is used to start and shut
time?
down a computer or mobile device, pro-
vide a user interface, manage programs A. FCFS
and memory, and provide file manage-
B. SJF
ment, among other functions?
A. An operating System C. Round-robin

B. A File Utility D. Priority


C. A System Utility 45. lubuntu is
D. Application Software
A. a C compiler
40. Iphone uses operating sytem. B. a version of the Linux kernel
A. Android C. a distribution of the Linux OS
B. iOS D. None of the above
C. Symbian
46. ) Which of the following circuit is used as
D. MeeGo
a special signal to demultiplex the address
41. ) Suppose registers ‘A’ and ‘B’ contain bus and data bus?
50H and 40H respectively. After instruc- A. Priority Encoder
tion MOV A, B, what will be the contents
of registers A and B? B. Decoder
A. 40H, 40H C. Address Latch Enable
B. 50H, 40H D. Demultiplexer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.1 Process Concept 149

47. Which of the following is not one of the C. When the CPU reads data, it first ac-
most common operating systems for per- cesses the primary cache memory, and
sonal computers? then it

PRACTICE BOOK» NOT FOR SALE


A. Microsoft Windows D. All of the data that is required for a pro-
cess needs to be present on the primary
B. IBM
or
C. Linux
52. are programs that designed to help
D. Mac OS X users to be more productive with their per-
sonal tasks.
48. What is the ready state of a process?
A. Software
A. a) when the process is scheduled to
run after some execution B. System Software
B. b) when the process is unable to run C. Application software
until some task has been completed D. Utility program
C. c) when process is using the CPU
53. The ability for an operating system to save
D. none of the mentioned and switch context to change processor ex-
ecution between multiple processes
49. This is not a version of Windows OS
A. multi-programming
A. Windows 93
B. multi-tasking
B. Windows 2000
C. multi-processing
C. Windows NT D. multi-plying
D. Windows 7
54. This is not Function of operating system
50. In an OS, the scheduling of processes is A. CPU Management
done by
B. Memory Management
A. the shell (.e.g. bash)
C. I/O Management
B. the graphical user interface (e.g., D. Revolving Management
gnome)
C. the file system 55. ) Which of the following is a typical ex-
ample of a system operating on a super
D. none of the above computer?
51. ) Which of the following is an appropri- A. A Supply Chain Management system
ate description concerning the primary and that is required for linkage between enter-
secondary cache memory that a CPU is prises
equipped with? B. A global climate change forecast sys-
A. The primary cache memory has larger tem that requires large-scale scientific
capacity than the secondary cache mem- andtechnical computing
ory. C. A banking system that requires a high
B. The secondary cache memory is reliability
slower than the main memory in writing D. An engine control system of a vehicle
and reading. that requires advanced real-time control

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.1 Process Concept 150

56. Which of the following commands appears 61. ) Orders are processed in the sequence
in the Insert menu or tab? they arrive if rule sequences the jobs.
A. Table A. earliest due date
B. Undo/Redo B. slack time remaining
C. Bold C. first come, first served
D. Line Spacing D. critical ratio

NARAYAN CHANGDER
57. The memory returned by a call to malloc
62. A Process Control Block(PCB) does not con-
comes from the
tain which of the following?
A. data segment
A. Code
B. heap segment
B. Stack
C. text segment
C. Bootstrap program
D. stack segment
D. Data
58. ) Which of the following is an OS func-
tion that executes several application pro- 63. In operating system, each process has its
grams progressively in turn on a single PC, own
such as when a file is downloaded from A. a) address space and global variables
a web site while data is processed with
spreadsheet software? B. b) open files
A. a.) Virtual reality C. c) pending alarms, signals and signal
handlers
B. b) Dual core
D. all of the mentioned
C. c) Dual system
D. d) Multitasking 64. The ability for an operating system to give
the appearance to the user of simultane-
59. Part of the operating system will loaded ous process execution by rapidly changing
in part of memory. between processes in short scheduled time
A. Upper slices
B. Lower A. multi-programming
C. Both B. multi-tasking
D. None of these C. multi-processing
60. In a operating system, the purpose of the D. multi-plying
stack is
65. ) Round robin scheduling falls under the
A. To store the return addresses of called category of
functions
A. Non-preemptive scheduling
B. To keep the parameters of called func-
tions B. Preemptive scheduling
C. To store local variables C. All of the mentioned
D. All of the above D. None of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.1 Process Concept 151

66. ) Which of the following is the appropri- 70. ) The microprocessor of a computer can op-
ate explanation of a master schedule in erate on any information if it is present in
a system development project where pro- only.

PRACTICE BOOK» NOT FOR SALE


cesses from requirements definition to in-
A. Program Counter
stallation are performed?
A. A schedule that describes in detail the B. Flag
activities of one (1) week C. Main Memory
B. A schedule that describes the activ- D. Secondary Memory
ities of one (1) day, the start and end
time of theactivities, and the persons in
71. ) If a 90 GB memory has to be connected
charge.
to a microprocessor, minimum how many
C. A schedule that describes in detail the address lines are required?
activities of the main processes
A. 36
D. A schedule that aggregates the main
deliverables and activities of the entire B. 39
project C. 32
67. )Which of the following is the correct se- D. 37
quence of operations in a microprocessor?
A. Opcode fetch, memory read, memory 72. ) Which of the following is the most appro-
write, I/O read, I/O write priate description concerning a compatible
CPU?
B. Opcode fetch, memory write, memory
read, I/O read, I/O write A. It can run the OS or the application
software that can be run on the original
C. I/O read, opcode fetch, memory read,
CPU.
memory write, I/O write
D. I/O read, opcode fetch, memory write, B. It must not be developed nor manufac-
memory read, I/O write tured as long as the patents of the original
CPU
68. Operating system is a
C. A compatible CPU for single-core CPU
A. Hardware has been developed, while one for multi-
B. Software core

C. Virus D. It is a CPU that is intended to improve


the performance of an outdated PC, and is
D. None of these
not
69. Which of these is NOT application soft-
ware? (tick all that apply) 73. The entry of all the PCBs of the current
processes is in
A. operating system
A. Process Register
B. spreadsheet
C. web browser B. Program Counter

D. anti-virus C. Process Table


E. backup & restore D. Process Unit

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.2 Process Scheduling 152

74. The LXSS manager is a component of 75. Which of these is NOT a key function of an
A. Linux OS to support the virtualization operating system
of Windows A. user interface
B. Windows OS to support Linux’s system
calls B. file management
C. macOS X to support Windows’ system C. processor management
calls
D. memory management

NARAYAN CHANGDER
D. Android to support the virtualization of
Windows Phone E. word processing

3.2 Process Scheduling


1. In scheduling vocabulary, the trait of ver- B. Using very small time slices converts
satility means it into First come first served scheduling
algorithm
A. The task can’t be started until its pre-
requisite tasks are completed first. C. Using extremely small time slices in-
creases performance
B. The processing time for a task is the
same regardless of which processor is D. Using very small time slices converts
completing it. it into Shortest Job First algorithm

C. Once a processor starts a task, it will 4. allows the superuser to set a global
complete it without interruption. kernel variable to a value that gives the
current time.
D. Any processor can execute any task
A. time
2. Consider the following set of processes, B. times
with the arrival times and the CPU-burst
C. stime
times given in millisecondsProcess Arrival
Time Burst Time P1 0 5 P2 1 3 P3 2 3 P4 D. none of above
4 1What is the average turnaround time
5. In the time sharing operating system,
for these processes with the preemptive
when the time slot given to the process
shortest remaining processing time first
completed, the process goes from the Run-
(SRPT) algorithm?
ning state to the
A. 5.8
A. Blocked State
B. 7.75 B. Ready State
C. 6.5 C. Suspended State
D. 5.50 D. Terminated State

3. With round robin scheduling algorithm in a 6. The strategy of making processes that are
time shared system logically runnable to be temporarily sus-
pended is called:
A. Using very large time slices converts
it into First come first served scheduling A. Non preemptive scheduling
algorithm B. Shortest job first

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.2 Process Scheduling 153

C. Preemptive scheduling 12. A visual aid used in loading and scheduling


D. First come first served job is a:

PRACTICE BOOK» NOT FOR SALE


A. Gantt Chart
7. A numerically value implies a high
scheduling priority. B. planning file
A. Low C. bottleneck
B. High D. load schedule matrix
C. average 13. What is Scheduling?
D. none of above
A. allowing a job to use the processor
8. The interval from the time of submission B. making proper use of processor
of a process to the time of completion is
C. all of the mentioned
termed as:
A. Waiting time D. none of the mentioned

B. Turnaround time 14. In scheduling vocabulary, the trait of uni-


C. Response time formity means
D. Throughput A. The task can’t be started until its pre-
requisite tasks are completed first.
9. increments a field in the process table
B. The processing time for a task is the
that records the recent CPU usage of the
same regardless of which processor is
process.
completing it.
A. CPU handler
C. Once a processor starts a task, it will
B. Clock handler complete it without interruption.
C. interrupt handler D. Any processor can execute any task
D. none of above
15. Consider three CPU-intensive processes,
10. Which of the following scheduling algo- which require 10, 20 and 30 time units and
rithms is non-preemptive? arrive at times 0, 2 and 6, respectively.
A. Round Robin How many context switches are needed if
the operating system implements a short-
B. Multilevel Queue Scheduling with
est remaining time first scheduling algo-
Feedback
rithm? Do not count the context switches
C. FCFS at time zero and at the end.
D. SRTF A. 1
11. What is Turnaround time? B. 2
A. the total waiting time for a process to C. 3
finish execution
D. 4
B. the total time spent in the ready queue
16. Time at which the process arrives in the
C. the total time spent in the running
ready queue
queue
D. the total time from the completion till A. Turnaround time
the submission of a process B. Arrival time

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.2 Process Scheduling 154

C. Completion time 22. In priority scheduling algorithm:


D. Waiting time A. CPU is allocated to the process with
highest priority
17. In multilevel feedback scheduling algo-
rithm B. CPU is allocated to the process with
lowest priority
A. Classification of ready queue is perma-
nent C. equal priority processes can not be
scheduled
B. A process can move to a different clas-

NARAYAN CHANGDER
sified ready queue D. none of the mentioned
C. Processes are not classified into 23. The FIFO algorithm:
groups A. First executes the job that came in last
D. None of the mentioned in the queue
18. In priority scheduling algorithm, when a B. First executes the job that came in first
process arrives at the ready queue, its pri- in the queue
ority is compared with the priority of C. First executes the job that needs mini-
A. all process mal processor
B. currently running process D. First executes the job that has maxi-
mum processor needs
C. parent process
D. init process 24. What is the minimum time required to com-
plete eight independent tasks with a total
19. Module gives control of the CPU to the pro- task time of 160 minutes on four proces-
cess selected by the CPU scheduler sors?
A. Dispatcher A. 10 minutes
B. CPU Scheduler B. 20 minutes
C. Non preemptive Scheduler C. 40 minutes
D. Preemptive Scheduler D. 60 minutes
20. Which Scheduling algorithm allocates the 25. the amount of time without interruption
CPU first to the process that requests CPU required by one processor to execute that
first? task is called the
A. First Come First serve scheduling A. task time
B. shortest job scheduling B. work time
C. priority scheduling C. processing time
D. none of the mentioned D. nap time
21. Time required by a process for CPU execu- 26. Which of these is a benefit of FCFS
tion A. Simple to implement
A. Arrival time B. It considers priority
B. Completion time C. Long jobs will get completed eventu-
C. Burst time ally
D. Turn around time D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.2 Process Scheduling 155

27. is the only process that swaps process B. Any size job
into memory from swap device.
C. Large jobs

PRACTICE BOOK» NOT FOR SALE


A. process 0
D. none of above
B. process 1
C. init 32. Consider the 3 processes, P1, P2 and P3
shown in the table.Process Arrival time
D. getty Time Units Required P1 0 5 P2 1 7 P3 3
28. CPU scheduling is the basis of 4The completion order of the 3 processes
under the policies FCFS and RR2 (round
A. multiprocessor systems robin scheduling with CPU quantum of 2
B. multiprogramming operating systems time units) are
C. larger memory sized systems A. FCFS:P1, P2, P3 RR2:P1, P2, P3
D. none of the mentioned B. FCFS:P1, P3, P2 RR2:P1, P3, P2
29. An operating system uses shortest remain- C. FCFS:P1, P2, P3 RR2:P1, P3, P2
ing time first scheduling algorithm for pre- D. FCFS:P1, P3, P2 RR2:P1, P2, P3
emptive scheduling of processes. Consider
the following set of processes with their 33. The most popular priority rules include:
arrival times and CPU burst times (in mil-
liseconds):Process Arrival Time Burst Time A. FCFS
P1 0 12 P2 2 4 P3 3 6 P4 8 5The aver- B. LPT
age waiting time (in milliseconds) of the
C. SPT
processes is
D. EDD
A. 4.5
B. 5.5 E. all of the above

C. 6.8 34. Consider five processes P1, P2, P3, P4,


D. 7.5 and P5 with their respective arrival time
0, 1, 2, 3, 4 and burst time 4, 3, 1, 2, 5.
30. Four jobs to be executed on a single pro- The average TAT for FCFS algorithm is
cessor system arrive at time 0 in the or-
A. 5.6
der A, B, C, D. Their burst CPU time re-
quirements are 4, 1, 8, 1 time units re- B. 3.4
spectively. The completion time of A un- C. 3.8
der round robin scheduling with time slice
of one time unit is D. 6.8
A. 7 35. In priority scheduling algorithm, when a
B. 8 process arrives at the ready queue, its pri-
C. 9 ority is compared with the priority of

D. 10 A. All process
B. Currently running process
31. The SJF algorithm is not fair for which type
of job? C. Parent process
A. Small jobs D. Init process

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.2 Process Scheduling 156

36. Amount of time to execute a particular pro- 41. Correct scheduling techniques depend on
cess volume orders, nature of the operation and
overall complexity of job with FOUR (4)
A. Waiting time
criteria. Which of the following is NOT one
B. Turnaround time of the scheduling criteria?
C. Response time A. Minimize completion time
D. CPU utilization B. Minimize utilization of facilities

NARAYAN CHANGDER
C. Minimize work in process (WIP) inven-
37. The processes that are residing in main
tory
memory and are ready and waiting to ex-
ecute are kept on a list called: D. Minimize customer waiting time
A. job queue 42. Use the decreasing-time-list algorithm to
B. ready queue schedule these independent tasks on three
machines:8 minutes, 9 minutes, 11 min-
C. execution queue utes, 3 minutes, 4 minutes, 12 min-
D. process queue utesHow much time does the resulting
schedule require?
38. Which algorithm is complicated to imple-
A. P1:15; P2:15, P3:17
ment and might not look at small jobs
B. P1:17; P2:15, P3:15
A. Multi-level feedback
C. P1:20; P2:16, P3:12
B. Round robin
D. P1:11; P2:13, P3:23
C. FCFS
43. Program counter holds the address of
D. none of above
A. Instruction that is currently in execu-
39. Consider the following table of arrival tion
time and burst time for three processes B. Next instruction to be executed
P0, P1 and P2. (GATE-CS-2011)Process
Arrival time Burst TimeP0 0 ms 9 msP1 1 C. Data set
ms 4 msP2 2 ms 9 ms D. Memory
A. 4.33 ms 44. Which one is not one of the Scheduling al-
B. 6.33 gorithms mentioned earlier.
C. 5.0 ms A. First-Come First-Serve
D. 7.33 B. Round Bear
C. Shortest Job First
40. What is the minimum time required to per-
form six independent tasks with a total D. none of above
task time of 48 minutes on 3 machines? 45. Time quantum is defined in
A. 2 A. Shortest job scheduling algorithm
B. 8 B. Round robin scheduling algorithm
C. 16 C. Priority scheduling algorithm
D. 18 D. Multilevel queue scheduling algorithm

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.2 Process Scheduling 157

46. Head sweeps back and forth across the 51. Throughput is
disk, servicing requests according to SSTF
A. Total number of instructions executed
in a preferred direction

PRACTICE BOOK» NOT FOR SALE


at any point of time
A. SCAN
B. Number of instructions executed in
B. C-LOOK unit of time
C. C-SCAN
C. Number of instructions executed in 10
D. F-SCAN unit of time
47. CPU Scheduling is applied in D. None of the above
A. Running state
52. In multilevel feedback scheduling algo-
B. Waiting state
rithm
C. Ready state
A. a process can move to a different clas-
D. New state sified ready queue
48. Use the decreasing-time-list algorithm to B. classification of ready queue is perma-
schedule these independent tasks on two nent
machines:3 minutes, 5 minutes, 8 minutes,
4 minutes, 6 minutes, 1 minuteHow much C. processes are not classified into
time does the resulting schedule require? groups

A. P1:13; P2:14 D. none of the mentioned


B. P1:14; P2:13
53. In scheduling vocabulary, the trait of per-
C. P1:16; P2:11 sistence means
D. P1:15; P2:11 A. The task can’t be started until its pre-
49. For the processes listed in the follow- requisite tasks are completed first.
ing table, which of the following schedul- B. The processing time for a task is the
ing schemes will give the lowest average same regardless of which processor is
turnaround time? Process Arrival Time completing it.
Processing Time A 0 3 B 1 6 C 4 4 D 6
2 C. Once a processor starts a task, it will
complete it without interruption.
A. First Come First Serve
D. Any processor can execute any task
B. Non-preemptive Shortest Job First
C. Shortest Remaining Time 54. Every project has an absolute minimal time
D. Round Robin with Quantum value two that depends on the processing times and
precedence relations for the task and not
50. Under multiprogramming, turnaround time on the number of processors used. this is
for short jobs is usually and that for called
long jobs is slightly
A. shortest time
A. Lengthened; Shortened
B. Shortened; Shortened B. critical time

C. Shortened; Lengthened C. best time


D. Shortened; Unchanged D. least pay time

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.2 Process Scheduling 158

55. The problem with round robin, SJF and STR B. Shortest Job First
is what? C. Shortest Remaining Time First
A. They don’t take into account priority D. Priority Based scheduling
B. They all take too long
61. Priority scheduling where priority is the in-
C. Short jobs will not be completed verse of predicted next CPU burst time.
D. none of above A. Non preemptive Scheduling
56. Total amount of time a process has been B. Completion time

NARAYAN CHANGDER
waiting in the ready queue C. Shortest Job First
A. Throughput D. Turnaround time
B. Turnaround time 62. A company produces digital photo frames
C. Response time (i.e. photo frames that display digital pho-
D. Waiting time tographs). Identify the type of operating
system that the photo frame is most likely
57. Free space in swap device is maintained in to use.
A. Distributed
A. Linked list B. Embedded
B. map C. Multi-user
C. incore table D. none of above
D. none of above
63. Process which have the shortest burst
58. What is the name of the scheduler in Unix time are scheduled first.
system A. Shortest Remaining Time First
A. round robin B. Priority Based scheduling
B. circular queue C. First Come First Serve
C. round robin with multilevel feedback D. Shortest Job First
D. circular linked list 64. Which of these is NOT an aim of the CPU
59. In this, the process that comes first will be scheduler
executed first and next process starts only A. To maximise CPU time
after the previous gets fully executed. B. Process as many jobs as possible
A. First-come, first-serve C. To complete jobs in at least 30 seconds
B. Shortest-job-first scheduling
C. Round-robin scheduling D. none of above
D. Priority scheduling 65. Process are classified into different groups
E. Multilevel Queue scheduling in
A. Shortest job scheduling algorithm
60. It is preemptive mode of SJF algorithm in
which jobs are schedule according to short- B. Round robin scheduling algorithm
est remaining time. C. Priority scheduling algorithm
A. First Come First Serve D. Multilevel queue scheduling algorithm

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.2 Process Scheduling 159

66. A process can move between the various C. CPU Scheduling


queues D. CPU utilization

PRACTICE BOOK» NOT FOR SALE


A. Multilevel Feedback Queue
72. Which of the following statements are
B. Shortest Job First true? I. Shortest remaining time first
C. Priority Scheduling scheduling may cause starvationII. Pre-
emptive scheduling may cause starva-
D. Round robin
tionIII. Round robin is better than FCFS in
67. The maximum number of processes that terms of response time
can be in Ready state for a computer sys- A. I only
tem with n CPUs is
B. I and III only
A. n
C. II and III only
B. n2
D. I, II and III
C. 2n
73. The status of a task is always in one of
D. Independent of n
four states. Which of the following is not
68. The head moves from , serves all re- one of those official states:
quests in direction till it reaches the A. Ineligible
last request in one end.
B. Completed
A. 53, right C. Working on
B. 52, right D. Ready
C. 51, right
74. What is the minimum time required to com-
D. none of above plete 12 independent tasks on two proces-
69. The notation that tells us that task Z takes sors when the sum of all the times of the
3 units of time to complete is 12 tasks is 84 minutes?

A. Z3 A. 6
B. 14
B. Z3
C. 24
C. Zx3
D. 42
D. Z(3)
75. Process are classified into different groups
70. Each process is assigned a fixed time in
in
cyclic way.
A. shortest job scheduling algorithm
A. First Come First Serve
B. shortest job scheduling algorithm
B. Round Robin Scheduling
C. priority scheduling algorithm
C. Shortest Job First
D. multilevel queue scheduling algorithm
D. Shortest Remaining Time First
76. Simplest scheduling algorithm that sched-
71. Mid term scheduler is responsible of ules according to arrival times of pro-
A. Degree of multi-programming cesses.
B. Swat out-swap in A. First Come First Serve

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.2 Process Scheduling 160

B. Shortest Job First 81. How to compute or get the Turn Around
Time in round-robin scheduling?
C. Round Robin Scheduling
A. Time difference between waiting time
D. Priority Based scheduling
and arrival time
77. Consider an arbitrary set of CPU-bound B. Time difference between completion
processes with unequal CPU burst lengths time and burst time
submitted at the same time to a computer C. Time difference between completion
system. Which one of the following pro-

NARAYAN CHANGDER
time and arrival time.
cess scheduling algorithms would minimize
the average waiting time in the ready D. Time difference between waiting time
queue? and burst time

A. Shortest remaining time first 82. Consider three CPU intensive processes
B. Round-robin with time quantum less P1, P2, P3 which require 20, 10 and 30
than the shortest CPU burst units of time, arrive at times 1, 3 and
7 respectively. Suppose operating sys-
C. Uniform random tem is implementing Shortest Remaining
D. Highest priority first with priority pro- Time first (pre-emptive scheduling) algo-
portional to CPU burst length rithm, then context switches are re-
quired (suppose context switch at the be-
78. Degree of multi-programming is controlled ginning of Ready queue and at the end of
by Ready queue are not counted).
A. Short term scheduler A. 3
B. Mid term scheduler B. 2

C. Long term scheduler C. 4

D. Dispatcher D. 5

83. If a CPU has the following:Process A = 3


79. The selection process is carried out by
cycles Process B = 2 cyclesProcess C = 5 cy-
the?
clesWhich would implement ‘B’ the quick-
A. CPU Scheduler est?
B. Non preemptive Scheduling A. Round robin (1 cycle time slice)
C. Preemptive Scheduling B. FCFS
D. Dispatcher C. STR
D. none of above
80. Which module gives control of the CPU
to the process selected by the short-term 84. Which one of the following can not be
scheduler? scheduled by the kernel?
A. Dispatcher A. kernel level thread
B. Interrupt B. user level thread
C. Scheduler C. process
D. None of the mentioned D. none of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.2 Process Scheduling 161

85. In scheduling vocabulary, processors mean D. to delegate work


A. the people or machines that will carry 90. Which of the following statement(s)

PRACTICE BOOK» NOT FOR SALE


out the work is/are correct in the context of CPU
B. an indivisible unit of work that cannot scheduling? NOTE:MSQ TYPE QUESTION
(by nature or by choice) cannot be broken A. Turnaround time includes waiting time
up into smaller units.
B. The goal is to only maximize CPU uti-
C. the CPUs that drive the computers that
lization and minimize throughput
the software runs on
C. Round-robin policy can be used even
D. the people who process the required
when the CPU time required by each of the
forms
processes is not known apriori
86. In scheduling notation, D → F means D. Implementing preemptive scheduling
A. Person D must start before person F needs hardware support
B. Task D is a part of task F 91. Scheduling is done so as to
C. Task D must be started before task F A. increase CPU utilization
can be started
B. decrease CPU utilization
D. Task D must be completed before task
F can be started C. keep the CPU more idle
D. none of the mentioned
87. What is Waiting time?
A. the total time in the blocked and wait- 92. What scheduling algorithm assigns the
ing queues CPUto the process with the highest prior-
ity?
B. the total time spent in the ready queue
A. FIFO
C. the total time spent in the running
queue B. SJF non preemptive
D. the total time from the completion till C. SJF preemptive
the submission of a process D. priority
88. Keep the CPU as busy as possible 93. in priority scheduling algorithm
A. Throughput A. CPU is allocated to the process with
B. CPU Utilization highest priority
C. CPU Scheduler B. CPU is allocated to the process with
lowest priority
D. Response time
C. equal priority processes cannot be
89. In scheduling vocabulary, task mean scheduled
A. the machine that will carry out the D. none
work
B. an indivisible unit of work that cannot 94. To increase the priority of the processes to
(by nature or by choice) cannot be broken avoid the problem of starvation which of
up into smaller units. the following is used.

C. the item that must be completed on a A. Aging


to do list B. Paging

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.2 Process Scheduling 162

C. Segmentation end of the disk. At the other end, the direc-


D. Fragmentation tion is reversed and servicing continues.
A. LOOK
95. It is a CPU Scheduling algorithm where
each process is assigned a fixed time slot B. SCAN
in a cyclic way. C. C-SCAN
A. First-come, first-serve D. none of above
B. Shortest-job-first scheduling

NARAYAN CHANGDER
100. Consider the following statements about
C. Round-robin scheduling process state transitions for a system us-
D. Priority scheduling ing preemptive scheduling.I. A running pro-
cess can move to ready state. II. A ready
E. Multilevel queue scheduling process can move to ready state. III. A
96. Which of the following decisions covers blocked process can move to running state.
the longest and shortest time period? IV. A blocked process can move to ready
state. Which of the above statements are
A. Aggregate Planning and Short Term TRUE?
Scheduling
A. I, II, III ONLY
B. Capacity Planning and Short Term
Scheduling B. II, III ONLY
C. Aggregate Planning and Master Sched- C. I, II, IV ONLY
ule D. I, II, III AND IV
D. Master Schedule and Short Term
101. Which of the following process schedul-
Scheduling
ing algorithm may lead to starvation
97. P5 implies there are A. FIFO
A. at most five processors B. RR
B. at least five processors C. Shortest Job Next
C. exactly five processors D. NONE
D. one processor named P5
102. Which algorithm is being described..
98. Use the decreasing-time-list algorithm to “Long jobs might never get completed as
schedule these tasks on two processors:3 short processes will always ‘jump the
minutes, 5 minutes, 8 minutes, 4 minutes, queue”
6 minutes, 2 minutesHow much time does A. Round robin
the resulting schedule require?
B. FCFS
A. 14
C. STR
B. 15
D. none of above
C. 16
D. 18 103. Which of the following scheduling algo-
rithms may cause starvation? a. First-
99. In the algorithm, the disk arm starts at come-first-served b. Round Robin c. Pri-
one end of the disk and moves toward the ority d. Shortest process next e. Shortest
other end, servicing requests till the other remaining time first

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.2 Process Scheduling 163

A. a, c and e B. schedule
B. c, d and e C. priority

PRACTICE BOOK» NOT FOR SALE


C. b, d and e D. Nice
D. b, c and d
109. The interval from the line of submission
104. Short process behind long process of a process to the time of completion is
termed as
A. Process time
A. waiting time
B. Waiting time
C. Convoy effect B. throughput

D. Time C. turnaround time


D. response time
105. What is the minimum time required to
perform six independent tasks with a total 110. Using the FCFS algorithm, which process
task time of 48 minutes on 3 processors? is allocated the CPU first?
A. 2 A. The process that requests the CPU
B. 8 first.
C. 16 B. The process that requests the CPU
D. 18 last.
C. Processes are allocated the CPU ran-
106. Which of the following is responsible for domly.
CPU scheduling?
D. none of above
A. Long term scheduler
B. Mid term scheduler 111. If a process requires more physical mem-
ory than is currently allocated to it, either
C. Short term scheduler
as a result of user stack growth or invoca-
D. None of the above tion of the brk system call and if it needs
more memory than is currently available,
107. How to compute or get the Waiting Time the kernel does an swap of the pro-
in round-robin scheduling? cess.
A. Time difference between Turn Around
A. Fork
Time and Arrival Time
B. expansion
B. Time difference between Turn Around
Time and Burst Time C. vfork
C. Time difference between Completion D. exec
Time and Arrival Time.
112. Time at which process completes its exe-
D. Time difference between Completion
cution
Time and Burst Time
A. waiting time
108. Processes can exercise crude control of
B. Arrival time
their scheduling priority by using the
system call. C. Burst time
A. fair D. Completion time

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.3 Interprocess Communication 164

113. what is scheduling? achievable average waiting time for these


A. allowing a job to use the processor three processes in a non-preemptive sched-
uler (rounded to nearest integer) is mil-
B. making proper use of processor liseconds.
C. all of the mentioned
A. 12
D. none
B. 36
114. Which algorithm is defined in Time quan- C. 46
tum?

NARAYAN CHANGDER
D. 10 Use, for the minimum achievable av-
A. shortest job scheduling algorithm erage waiting time
B. round robin scheduling algorithm
116. The scheduling in which a running process
C. priority scheduling algorithm
cannot be interrupted by any other process
D. multilevel queue scheduling algorithm
A. Dispatcher
115. Three processes arrive at time zero with B. Preemptive Scheduling
CPU bursts of 16, 20 and 10 milliseconds.
If the scheduler has prior knowledge about C. Non preemptive Scheduling
the length of the CPU bursts, the minimum D. CPU Scheduler

3.3 Interprocess Communication


1. Which of the following communication 4. Which of the following method in IPC is the
models is NOT one-to-many? fastest?
A. Remote invocation A. Socket
B. Group communication B. Pipe
C. Shared data space C. Kernel
D. Publish-subscribe
D. Signal
2. Which of the following communication
paradigms is indirect? 5. Messages sent by a process:
A. Remote invocation A. have to be of a fixed size
B. Group communication B. have to be a variable size
C. Message passing C. can be fixed or variable sized
D. Stream-oriented D. None of the mentioned
3. Which of the following communication
6. A process can be terminated due to
models is less transparent?
A. Remote invocation A. normal exit

B. Message passing B. error


C. Shared memory C. abnormal exit
D. Publish-subscribe D. all of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.3 Interprocess Communication 165

7. Which of the following communication 12. which of the following methods/models in


paradigms does NOT decouple the sender IPC is/are not used in linux
and receiver in space (space decoupling)?

PRACTICE BOOK» NOT FOR SALE


A. Sockets
A. Group communication B. Semaphore
B. Distributed shared memory C. Message Passing
C. Message passing D. Message Queue
D. Publish-subscribe
13. Which of the following paradigms is con-
8. What is operating system? tinuous communication?
A. collection of programs that manages A. Shared data space
hardware resources B. Message passing
B. system service provider to the applica- C. Stream-oriented
tion programs D. Publish-subscribe
C. link to interface the hardware and ap-
plication programs 14. A process pair requires how many links if
the communication is direct?
D. all of the mentioned
A. 4
9. The link between two processes P and Q B. 1
to send and receive messagesis called
C. 3
A. synchronization link
D. 2
B. message-passing link
15. what are the endpoints of the Communica-
C. communication link
tion between two Processesin IPC?
D. all of the mentioned
A. Semaphore
10. Which of the following communication B. Pipe
paradigms is neither direct nor ephemeral C. Kernel
(i.e. transient)?
D. Sockets
A. Message queuing
B. Remote invocation 16. In Message Passing data are stored in
A. Register
C. Message passing
B. Main Memory
D. Stream-oriented
C. Kernel
11. What is a medium-term scheduler?
D. ROM
A. It selects which process has to be
brought into the ready queue 17. The link between two processes P and Q
to send and receive messages is called:
B. It selects which process has to be ex-
ecuted next and allocates CPU A. communication link
C. It selects which process to remove B. message-passing link
from memory by swapping C. synchronization link
D. None of the mentioned D. all of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.3 Interprocess Communication 166

18. Message passing system allows processes B. the sender blocks until the receiver re-
to ceives the message
A. share data C. the sender keeps sending and the mes-
B. name the recipient or sender of the sages don’t wait in the queue
message D. none of the mentioned
C. communicate with each other without
23. How many methods are in IPC?
sharing the same address space

NARAYAN CHANGDER
A. SIX
D. communicate with one another by re-
sorting to shared data B. FIVE
C. SEVEN
19. The objective of multi programming is to:
D. EIGHT
A. Have some process running at all
times 24. Message Passing is accomplished using
B. Have multiple programs waiting in a
queue ready to run A. communication Link
C. To minimize CPU utilization B. Message Passing Link
D. None of the mentioned C. System Calls
20. In indirect communication between pro- D. Interrupt
cesses P and Q:
25. Which of the following do not belong to
A. there is another process R to handle queues for processes?
and pass on the messages between P and
Q A. Job Queue

B. there is another machine between the B. PCB queue


two processes to help communication C. Device Queue
C. there is a mailbox to help communica- D. Ready Queue
tion between P and Q
26. Message sent follows in Inter Process
D. none of the mentioned
Communication?
21. Which of the following communication A. LIFO
models allows the sender and the receiver
B. FIFO
to be separated in space (space decou-
pling)? C. PISO
A. Remote invocation D. SIPO
B. Message passing 27. How do the multiple processes communi-
C. Message queuing cate in the Message passingtechnique?
D. Publish-subscribe A. Through Messages

22. In the Zero capacity queue: B. Shared memory region

A. the queue can store at least one mes- C. None of the above
sage D. Both a & b

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.4 Client Server Systems 167

28. The address of the next instruction to be C. the sending process keeps sending un-
executed by the current process is pro- til it receives a message
vided by the

PRACTICE BOOK» NOT FOR SALE


D. none of the mentioned
A. CPU registers
B. Program counter 31. Which process can be affected by other
processes executing in the system?
C. Process stack
D. Pipe A. cooperating process
B. child process
29. What is inter process communication?
A. communication between two threads C. parent process
of same process D. init process
B. Communication between two process
C. None of the mentioned 32. Which of the following paradigms pro-
vides persistent communication between
D. doesn’t allow for communication sender and receiver?
30. In the non blocking send: A. Shared data space
A. the sending process keeps sending un- B. Message passing
til the message is received
C. Remote invocation
B. the sending process sends the mes-
sage and resumes operation D. Group communication

3.4 Client Server Systems


1. Which is a disadvantages of a client-server C. Spelling and grammar errors +
network? Threats of losing service
A. When server isn’t on, clients don’t D. Use of bold and italics + An image con-
power up tained in the message
B. Clients can’t connect wirelessly to the 3. What is an API?
server
A. A set of protocols which define how
C. Dependent on server-if it goes down, two applications interact with each other
clients stop working
B. A protocol that state the error check-
D. Clients are more expensive than ing that will be used in communication
servers
C. A database query
2. What are two attributes that an email D. A protocol that splits data up in to pack-
message may contain that should cause a ets and then reassembles it
user to question whether the message is a
phishing attempt? 4. ll devices on a p2p network have an
status
A. An image contained in the message +
s pelling and grammar errors A. equal
B. Threats of losing service + Use of bold B. unequal
and italics C. identical

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.4 Client Server Systems 168

D. none of above 10. Which transmission media is capable of


having a much bigger bandwidth?
5. Which if these terms refers to the max-
imum rate at which data can be trans- A. Coaxial
ferred? (1-4) B. Twisted pair cable
A. Error detection C. Plastic
B. Packet switching D. Fibre optoc
C. Bandwidth 11. Phishing is an attempt to:

NARAYAN CHANGDER
D. Transmission media A. Obtain information by posing as a
trustworthy entity.
6. Which of the following is an example
of what is usually done using client-side B. Limit access to e-mail systems by au-
scripting? thorized users.
A. Accessing web databases C. Steal data through the use of network
intrusion.
B. Simple validation of user input
D. Corrupt e-mail databases through the
C. Create stylesheet files using PHP use of viruses.
D. Complex calculations
12. Evaluate the statement pick the correct an-
7. What is the primary advantage of using swer for the underlined phrase.A mail sys-
Active Directory Integrated Zones? tem administrator scans for viruses in in-
coming emails to increase the speed of mail
A. Zone encryption
processing.
B. Password protection
A. Decrease the chances of a virus get-
C. Non-repudiation ting to a client machine
D. Secure replication B. Verify that the senders of the mes-
sages are legitimate
8. Each statement in PHP and Javascript ends
with C. Ensure that all links in the messages
are trustworthy
A. A new line
D. No change is needed.
B. A colon
C. A semi-colon 13. Which of the following is not a type of
server?
D. A curly bracket
A. File Server
9. Which is NOT an advantage of a thin- B. Email Server
client?
C. Webpage Server
A. Easy and cheap to set up new clients
D. PowerPoint Server
B. Hardware and software changes only
need to be implemented on the server 14. Which best describes a server?
C. Greater security as clients have fewer A. A computer that stores data
rights B. A computer that stores software
D. May require greater bandwidth to C. Central computer-provides clients
cope with client requests with functionality

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.4 Client Server Systems 169

D. A computer within a network C. Updates licensing for Windows


servers
15. Which of these are functions that servers

PRACTICE BOOK» NOT FOR SALE


can perform? D. Manages updates for Microsoft soft-
ware
A. Controls the level of user access to
files and software
20. Physically securing servers prevents:
B. Controls installation of software on the
client computers A. Theft
C. Controls access to network printers B. Compromise of the certificate chain
and managing print queues
C. Man-in-the middle attacks
D. Controls client computer access to the
Internet D. Denial of Service attacks
E. All of the above
21. Which of these is not a benefit to cloud
16. Lisa is trying to get rid of a virus that has computing?
invaded their network. It seems to keep
A. Saves storage space on your PC
changing making it difficult to detect. Lisa
is facing what type of malware? B. Gives you access to files from any com-
A. polymorphic virus puter
B. cookie C. Protects your files from being lost due
to PC failure
C. retro virus
D. spyware D. Completely protects your information
from cloud hackers
17. What is not a benefit of networking?
A. Share hardware 22. What does CRUD stand for?
B. Share software A. create, retrieve, update, delete
C. Share viruses B. capture, repeat, update, delete
D. Share workstations
C. create, return, undo, decide
18. The purpose of User Account Control (UAC) D. condition, release, upscale, document
is to:
A. Encrypt the user’s account 23. Which of the following is a disadvantage
B. Limit the privileges of software of a client-server network?
C. Secure your data from corruption A. Files and folders cannot be centrally
D. Facilitate Internet filtering backed up.
B. Does not need an expensive server
19. Windows Server Update Services (WSUS)
as individual workstations are used to ac-
is a tool that:
cess files.
A. Updates data stored in Windows
servers C. The server is expensive to purchase
B. Manages the services that run on a D. Files are stored in a centralised loca-
server tion, meaning it is easier to backup.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.4 Client Server Systems 170

24. Which of these is an advantage of cloud 29. Which two security settings can be con-
storage? trolled by using group policy? (Choose
A. The user has no control over their data two.)

B. Many programs can be run at the same A. Password complexity


time, regardless of the processing power B. Access to the Run As command
of your device
C. Automatic file locking
C. Accessible anywhere with an internet
D. Encrypted access from a smart phone

NARAYAN CHANGDER
connection
D. Portability 30. You want to make your computer resistant
to online hackers and malicious software.
25. What is the process of using third party What should you do?
servers to store data and run online appli-
cations? A. Configure a forward proxy

A. Data Center Processing B. Install anti-virus software

B. Cloud Computing C. Enable spam filtering

C. Networking D. Turn on Windows Firewall


D. Internet Usage 31. Where is data stored in a client-server net-
work?
26. How is adware malicious?
A. In the cloud
A. Deletes files.
B. On each PC
B. Inappropriate and wastes your time/
C. In the switch
C. Slows your pc down.
D. Centrally
D. Spies on you, collecting your informa-
tion 32. Which one of these items is not an advan-
27. What does implementing Windows Server tage of a client-server network?
Update Services (WSUS) allow a company A. No central point of failure
to manage?
B. Central control of security
A. Shared private encryption key updates
C. Easier to supervise network perfor-
B. Updates to Group Policy Objects mance
C. Active Directory server replication D. Easier to perform software upgrades
D. Windows updates for workstations
and servers 33. Role separation improves server security
by:
28. What does the ‘thickness’ of a client refer A. Enforcing principle of least privilege.
to?
B. Installing applications on separate
A. How clever the client is hard disks.
B. The size of the cables C. Physically separating high security
C. The level of processing and storage servers from other servers.
D. The depth of the computer case D. Placing servers on separate VLANs.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.4 Client Server Systems 171

34. HTML can be used to create ‘static’ web C. Download email attachments
pages. For a client-server application, the D. None of these
web page is ‘dynamic’ thanks to

PRACTICE BOOK» NOT FOR SALE


39. Keeping a server updated:
A. CSS
A. Maximizes network efficiency
B. Javascript
B. Fixes security holes
C. PHP
C. Speeds up folder access
D. Javascript and PHP
D. Synchronizes the server
35. Which one of these items is true of a peer-
40. Why is a client reliant on a server?
to-peer network?
A. The client might might get abducted
A. No network wide security in place
without the server
B. Central control of security B. The server prevents the client from
C. Has a central point of failure breaking down
D. Easier to perform network wide back- C. Client retrieves saved data and soft-
ups ware from the server
36. What is meant by latency in the perfor- D. The clients does not power on without
mance of a network? (6-9) the server

A. The amount of time data takes to travel 41. A tool(s) to detect and protect against ma-
from the source to the destination licious email is/are
B. The maximum rate that data can be A. Bayesian filter
transferred at B. Sender Policy Framework
C. The number of errors that are found in C. UAC
a data packet after transmission D. MBSA
D. The route a packet takes when it is be-
42. Which is NOT true of the websocket pro-
ing transmitted
tocol?
37. Which of the following is BAD advice for A. Provides a persistent, bi-directional
protecting your computer against infec- real-time communication channel be-
tion? tween client and server
A. Open email attachments if they look in- B. Is an example of a modern API used
teresting for communication
B. Use up-to-date anti-virus software and C. Typical uses are online gaming and in-
always download the latest definitions stant messaging
C. Only download files from reputable in- D. Increases data usage
ternet sites
43. The CRUD operation ‘Retrieve’ would map
D. None of these to which SQL database function?
38. What is the most common way people’s A. SELECT
computers get infected by a virus? B. INSERT
A. Receive a call C. UPDATE
B. Install a new hardware D. DELETE

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.4 Client Server Systems 172

44. Which best describes a peer to peer net- B. Computers are connected together us-
work? ing a leased line or a satellite
A. To peers connected together C. Users can share files and peripherals
B. Devices connected together-without a D. Data can only be transmitted at a very
server slow rate
C. To piers connected together 49. Most web applications nowadays are ex-
D. Two devices connected together- ample of client-server application that in-

NARAYAN CHANGDER
without a client corporates a database such as MySQL.
This database is usually stored in
45. How does the sender policy framework A. Client computer
(SPF) aim to reduce spoofed email?
B. Server computer
A. It provides a list of IP address ranges C. Third party computer between Client
for particular domains so senders can be and Server
verified.
D. Parts in client, parts in server
B. It includes an XML policy file with each
email that confirms the validity of the mes- 50. Which is not true in a client-server net-
sage. work?
C. It lists servers that may legitimately A. A server manages access to the inter-
forward mail for a particular domain. net
D. It provides an encryption key so that B. A client makes requests to the server
authenticity of an email message can be for data and connections
validated C. A server runs a backup of data
D. Each peer is responsible for its own
46. Which technology enables you to filter
backup
communications between a program and
the Internet? 51. Which of these is an example of a modern
A. RADIUS server API used for communication?

B. Antivirus software A. Websocket protocol


B. TCP/IP
C. Software firewall
C. JSON
D. BitLocker To Go
D. HTTP
47. What is spyware?
52. You need to install a domain controller in
A. Causes adverts to appear on screen. a branch office. You also need to secure
B. Software that deletes your files theinformation on the domain controller.
You will be unable to physically secure the
C. Slows your pc down. server. Which should you implement?
D. Collects information from you and A. Read-Only Domain Controller
transfers it across the internet.
B. Point-to-Point Tunneling Protocol
48. Which of these is a characteristic of a (PPTP)
LAN? C. Layer 2 Tunneling Protocol (L2TP)
A. It covers a wide geographical area D. Server Core Domain Controller

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.4 Client Server Systems 173

53. The purpose of Microsoft Baseline Security 58. Which is a disadvantage of a peer to peer
Analyzer is to: network?

PRACTICE BOOK» NOT FOR SALE


A. List system vulnerabilities. A. Central management is more difficult
B. Apply all current patches to a server. B. Peer to peer networks are expensive
C. Set permissions to a default level. C. No central management, can be slow
D. Correct a company’s security state D. Peer to peer networks are difficult to
maintain
54. What is JSON or XML used for?
59. Why is a trojan horse sneaky?
A. Standard methods for transferring
data between a server and an application A. It is very inviting
B. For uploading files to a server B. It creeps into your computer

C. Requesting a webpage C. It looks legitimate but really it isn’t

D. Enables CRUD to be mapped to data D. Because of the romans


SQL functions 60. Web application is usually an example of
client-server application. The client appli-
55. What is a disadvantage of a LAN?
cation is
A. Site (software) licences are likely to be
A. The browser
cheaper than buying several standalone li-
cences. B. The XAMPP
B. Security is good-users cannot see C. The Apache
other users’ files unlike on stand-alone D. The MySQL
machines.
61. How do you display a message in PHP?
C. if the main cable fails or gets damaged
the whole network will fail A. Echo (”Hello”)
D. Purchasing the network cabling and B. print (”Hello”)
file servers can be expensive. C. msgbox (”Hello”)
56. Which best describes a client? D. alert (”Hello”)

A. A computer connected to a client- 62. Evaluate the statement pick the correct an-
server network swer for the underlined phrase.The Win-
B. Something that serves the server dows Firewall protects computers from
unauthorized network connections.
C. A client belongs to the server
A. Email viruses
D. Something that is connected to the
B. Phishing scams
main computer
C. Unencrypted network access
57. what does p2p stand for
D. No change is needed
A. peer two peer
63. Which is an advantage of client-server net-
B. point 2 point
works?
C. pear too pear A. Files/Internet connection/hardware
D. peer to peer can be shared

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.4 Client Server Systems 174

B. The network never stops functioning C. By being disguised as legitimate soft-


C. The network is always fast and reliable ware.

D. A client’s data is backed up every D. Dodgy web links


minute
69. Donna wants to implement User Access
64. Choose one reason why a developer might Control (UAC) across his Microsoft Win-
use client-side scripting dows network. What does she need to do
A. It’s easier to write for a client to accomplish this?

NARAYAN CHANGDER
B. So the client can access the database A. Make sure all systems are Windows 7
or later
C. It allows some of the processing to be
done by the user’s machine B. Install Applocker
D. The client computer is more powerful C. Set a security baseline
than the server
D. Install Windows Defender
65. Bob needs to restrict the websites the em-
ployee can go to. What are some of her 70. Question 4:Which of these statements is
options? true?

A. Applocker A. A client-server network has a central


computer that provides services to the
B. Setup Content Zones rest of the network
C. Windows Firewall
B. A client-server network is cheap and
D. Bayesian Filter easy to set up
66. You suspect a user’s computer is infected C. A client-server network cannot be
by a virus.What actions should you take? used to share files
A. Restart the computer in safe mode D. Each computer on a client-server net-
B. Replace the computer’s hard disk drive work is maintain separately

C. Disconnect the computer from the net- 71. What is an advantage of a LAN?
work in connected to business network
A. You can save money by sharing periph-
D. Run an on demand antivirus scan of all erals like printers.
files
B. It is limited to a small area.
67. Which of the following languages is used
C. Can cover near infinite geographical
for server side scripting on the web?
distance.
A. HTML
D. Expensive to setup.
B. Javascript
C. PHP 72. What does a server store?
D. VBA A. Client data

68. How can a trojan infect your pc? B. Software and client data
A. On memory sticks. C. Back up files
B. Through email attachments. D. Software

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.4 Client Server Systems 175

73. Which is not an advantage of the client- 78. which refers to a p2p
server model? A. all clients are equal but some are more

PRACTICE BOOK» NOT FOR SALE


A. Easier to manage security of files equal than others
B. Easier to take backups of all shared B. none of the clients are equal
data C. all the clients are equal
C. Easier to install software updates to D. none of above
all computers
D. Offers a single point of failure 79. Why would a company use Windows
Server Update Services (WSUS) sever?
74. What is a standalone computer? Choose the best two answers
A. A computer that is not connected to a A. to test updates before installing them
network B. update workstations and servers
B. A computer that is being used as a C. manage costs
server
D. keep all systems with all the same
C. A computer that does not have any pe- patches
ripherals attached to it
D. A computer that is used by only one 80. In web applications HTML pages are
person stored in
A. Client computer
75. Which one of these items is true of a client-
server network? B. Server computer
A. Needs a network manager to run the C. Third party computer between Client
network and Server
B. No centralised management D. Parts in client, parts in server
C. All computers have equal status 81. To make a computer becomes a web server
D. No dependency on a server this software could be installed
A. Apache
76. Which of the following languages is used
for client-side scripting on the web? B. Javascript
A. HTML C. PHP
B. Javascript D. Visual Basic
C. PHP 82. Evaluate the statement pick the correct an-
D. VBA swer for the underlined phrase. A user
who receives a large number of emails sell-
77. A computer network is connected to- ing prescription medicine is probably re-
gether. ceiving pharming mail .
A. One computer A. Malware
B. Two or more B. Spoofed mail
C. Three or more C. Spam
D. Four or more D. No Change is Needed

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.4 Client Server Systems 176

83. What is Representational State Transfer 89. What is meant by a data packet?
(REST) used for? A. A unit of data that travels along a net-
A. AN API that enables CRUD to be work
mapped to SQL functions B. The number of errors found in data
B. A protocol for addressing data packets when it has been transmitted
C. A protocol that allows files to be up- C. The data a computer needs to connect
loaded to a server to a network

NARAYAN CHANGDER
D. A security method D. A connection point in a network that al-
lows data to be shared
84. What are the advantages of a peer to peer
network? 90. choose 2:on a client server it is easier to
A. More stylish
B. Relatively cheap, low maintenance A. manage backups
C. Faster B. manage security files
D. More effective C. to set up
D. use as it does not need specialist staff
85. LAN stands for
A. Local Area Network 91. Which of the following is an advantage of
a peer to peer network?
B. Large Area Network
A. Files and folders cannot be centrally
C. Little Area Network
backed up.
D. Local Analogue Network
B. Does not need an expensive server
86. Which is NOT true of JSON? as individual workstations are used to ac-
cess files.
A. More complicated for a human to read
C. The server is expensive to purchase
B. More compact code
D. Network security can be carried out
C. Easier for computers to parse
centrally.
D. Easier to create
92. Which Internet Explorer zone is the least
87. What is an example of non-propagating secure?
malicious code?
A. Internet zone
A. A back door
B. local intranet zone
B. A hoax
C. trusted sites zone
C. A Trojan horse
D. restricted sites zone
D. A worm
93. What is cloud storage?
88. Where are you most likely to find a peer-
to-per network? A. Storing data on the server of another
company, accessible through the Internet
A. In a large organisation
B. Storage accessible anywhere with an
B. In a home internet connection
C. In a large office C. Running programs on a remote server,
D. Across several offices in a company accessible with an Internet connection

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


3.4 Client Server Systems 177

D. All of the above 97. How does a computer virus infect a pc?
A. Email attachments
94. In PHP assigning value to a variable may

PRACTICE BOOK» NOT FOR SALE


look like this: B. Attached to files on memory sticks
A. $ myname = “Vanness” C. Suspicious web links

B. myname = “Vanness” D. All of the above

C. $myname = “Vanness” 98. Select all the true statements:


D. var myname = “Vanness” A. There needs to be a server for each
client to save and manage each worksta-
95. Which of these is a benefit of a peer-to- tion’s data.
peer network? B. Peer-to-peer networks are easier to
A. Antivirus scans can be run across all set up than client-server networks
computers from one computer C. Peer-to-peer networks allow individ-
B. All software updates can be run across ual devices to share files between each
all computers from one computer other.

C. All computers can be maintained from D. Peer-to-peer networks are commonly


one computer used in large organisations
E. It is easier to implement security pro-
D. Files and peripherals can be shared
cedures throughout a client-server net-
96. Which of these components is internal to work than a peer-to-peer network.
a computer and is required to connect the 99. What the common way used to define how
computer to a network? long a password is in Windows?
A. Wireless Access Point A. registry
B. Network Interface card B. Users applet in the Control Panel
C. Switch C. group policies
D. Hub D. NTFS files

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4. Threads

NARAYAN CHANGDER
4.1 Overview
1. Uses BLOCKS = commands C. privacy
A. Linux D. responsiveness
B. Windows 5. What is multithreaded programming?
C. Android
A. It’s a process in which two different
D. Mac OS X processes run simultaneously
2. Which method is used to wait for child B. It’s a process in which two or more
threads to finish in Java? parts of same process run simultaneously
A. wait () C. Its a process in which many different
process are able to access same informa-
B. sleep ()
tion
C. join ()
D. Its a process in which a single pro-
D. isAlive() cess can access information from many
sources
3. One system call, if executed, can disrupt
threads in execution, blocking all possibili- 6. Which of this method can be used to make
ties the main thread to be executed last among
A. OS Dependent all the threads?
B. Kernel-Level Threads(KLT) A. stop
C. System Call Blocking B. sleep
D. User-Level Threads (ULT) C. join

4. Choose THREE(3) benefits of multi- D. wait


threaded processing 7. How many ways a thread can be created
A. scalability in Java multithreading?
B. resource sharing A. 1

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Overview 179

B. 2 13. How many threads does a process con-


C. 5 tains?

PRACTICE BOOK» NOT FOR SALE


A. 1
D. 10
B. 2
8. Which of these is not a thread state? C. multiple
A. new D. none
B. runnable
14. Which of these method is used to tell the
C. sleep calling thread to give up a monitor and go
D. terminated to sleep until some other thread enters the
same monitor?
9. Which is the static method? A. wait()
A. wait() B. notify()
B. sleep() C. notifyAll()
C. Both D. sleep()
D. None 15. One process = many threads
10. Which of these keywords are used to im- A. Linux
plement synchronization? B. Windows
A. synchronize C. Android
B. syn D. Mac OS X
C. synch 16. sleep() method belongs to which class?
D. synchronized A. Object
B. Thread
11. What is difference between starting
thread with run() and start() method? C. Exception
A. There is no difference D. InputStream
B. when you call start() method, main 17. The life cycle of a thread in java is con-
thread internally calls run() to start the trolled by
newly created thread. A. JRE
C. run() calls start() method internally B. JDK
D. None of the above C. JVM
12. tells calling thread to give up monitor D. None
and go to sleep until some other thread en- 18. Which of this class is used to make a
ters the same monitor and call notify. thread?
A. wait() A. String
B. notify() B. System
C. notifyAll() C. Thread
D. start() D. Runnable

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Overview 180

19. What method in thread class do you call 25. It is defined resources in the process, i.e.,
to make the current thread cease execut- allocation of I/O devices.
ing for a specified amount of time?
A. Resource Ownership
A. sleep()
B. Threads
B. pause()
C. stop() C. Process Execution

D. wait() D. Process

NARAYAN CHANGDER
20. Which method must be defined by a class 26. Which thread will be executed first if two
implementing the java.lang.Runnable in- threads have same priority
terface?
A. They will fall in starvation and none will
A. public void start()
be executed.
B. public void run()
B. Both will be executed simultaneously
C. void run()
C. It depends upon operating system
D. None of these
D. They will be executed on first come
21. Daemon thread runs in
first serve basis
A. Background
B. Foreground 27. wait(), notify() and notifyAll() belongs to
which class?
C. Both
D. none A. Thread

22. No multithreading B. Object


A. Linux C. FileInputStream
B. Windows D. Exception
C. Android
28. Which method must be implemented by a
D. Mac OS X
Java thread?
23. If a priority of a java thread is 3 then the
A. run()
default priority of its child thread will be
A. 0 B. execute()

B. 1 C. start()
C. 5 D. None
D. 3
29. Which method is called internally by
24. What are the approaches under mutual ex- Thread start() method?
clusion?
A. execute()
A. Synchronized method
B. run()
B. Synchronized block
C. Static synchronization C. launch()
D. All the above D. main()

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Overview 181

30. Which of this method is used to begin the 36. What will happen if two thread of the
execution of a thread? same priority are called to be processed
simultaneously?

PRACTICE BOOK» NOT FOR SALE


A. run()
B. start() A. Anyone will be executed first lexo-
graphically
C. runThread()
B. Both of them will be executed simulta-
D. startThread() neously
31. All of the work of thread management is C. None of them will be executed
done by the kernel. D. It is dependent on the operating sys-
A. OS Dependent tem
B. Kernel-Level Threads(KLT) 37. It is a states and dispatch processes
C. System Call Blocking A. Resource Ownership
D. User-Level Threads (ULT) B. Threads
32. In java multi-threading, a thread can be C. Process Execution
created by D. Process
A. Extending Thread class
38. Identify the correct mutual exclusion
B. Implementing Runnable interface approach:synchronized static returntype
C. Using both method(parameters){}
D. None A. synchronized method

33. Which of these method is used to explicitly B. synchronized block


set the priority of a thread? C. static synchronization
A. set() D. None
B. make() 39. Why to use synchronization?
C. setPriority() A. Avoiding thread interference
D. makePriority() B. Avoiding consistency problem
34. In JAVA multi threading, a thread can be C. Both
created by D. None
A. Extending class
40. Which statements is correct
B. Implementing Runnable Interface
A. On calling Thread start () method a
C. both new thread get created.
D. none B. Thread start () method call run ()
35. Thread priority in Java is? method internally

A. Integer C. Thread run () method can also be


called directly to create thread.
B. Float
D. On calling Thread start () method a
C. double new thread get created & Thread start ()
D. long method call run () method internally

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Overview 182

41. Choose the correct syntax for synchro- C. Static Synchronization


nized method. D. None
A. synchronized returntype method-
name( ) 47. distributing task across multiple com-
puting cores
B. returntype methodname( )
A. data parallelism
C. synchronized methodname( )
B. implicit threading
D. None

NARAYAN CHANGDER
C. task parallelism
42. Default value of a java thread is D. identifying task
A. 0
48. Select method that must be defined by a
B. 1 class implementing the java.lang.Runnable
C. 5 interface.
D. 10 A. public void runs()
B. public void run()
43. Which method is used to get current run-
ning thread object? C. public void start()

A. runningThread() D. void run(int priority)

B. currentThread() 49. Complete the program code below that


is suitable to start a thread.class X im-
C. runnableThread()
plements Runnable { public static void
D. None main(String args[]) { /* Missing code? */
} public void run() {} }
44. Which method is used to create a daemon
thread? A. Thread t = new Thread(X);
A. setDaemon(boolean value) B. X x1 = new X(); Thread t = new
Thread(x1); t.start();
B. setThread(boolean value)
C. Thread t = new Thread(X); t.start();
C. createDaemon(boolean value)
D. Thread t = new Thread(); x.run();
D. makeDeamon(boolean value);
50. True statement about process and thread
45. Which of this method of Thread class is is/are
used to suspend a thread for a period of
A. If a child process crashes all main pro-
time?
cess will also be crashed
A. sleep()
B. If a child thread is crash entire pro-
B. terminate() cess will crash
C. suspend() C. Threads have their own memory stack
D. stop() D. Each process has different virtual
space
46. Identify the correct mutual exclusion ap-
proach:synchronized(this){ } 51. It refers to a subset of a process.
A. Synchronized method A. Resource Ownership
B. Synchronized block B. Threads

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Overview 183

C. Process Execution B. First thread start() is called then set-


D. Process Daemon()

PRACTICE BOOK» NOT FOR SALE


C. Call thread start() and setDaemon() in
52. Which will contain the body of the thread any order
in Java?
D. All correct
A. start()
B. run() 58. is the return type of isDaemon()
C. main() A. String
D. execute() B. int
C. boolean
53. What is true about threads?
D. float
A. Threads consumes CPU in best possi-
ble manner 59. Q) Which method is used to check if a
B. Threads enables multi processing. thread is running?
C. Multi threading reduces idle time of A. isAlive()
CPU B. run ()
D. All of these C. alive ()
54. What is maximum thread priority in Java D. keepAlive()
A. 10 60. wakes up all the threads that called
B. 12 wait() on same object.
C. 5 A. notify()
D. 8 B. notifyAll()

55. Daemon thread is a priority thread. C. wait()

A. low D. sleep()
B. high 61. Which method is used to make main thread
C. Normal to wait for all child threads
D. None A. join ()
B. sleep ()
56. Which of this interface is implemented by
Thread class? C. wait ()
A. Runnable D. stop ()
B. Connections 62. It is the presence of cores in a single or
C. Set more processors in a given system.
D. MapConnections A. Multicore
B. Thread
57. To create a daemon thread
A. First thread setDaemon() is called C. Multithreading
then start() D. Core

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Overview 184

63. It is a threads that rely heavily on the C. It’s a process by which a method is
Operating System through dispatched pro- able to access many different threads si-
cesses in the processing queue. multaneously
A. OS Dependent D. It’s a method that allow too many
threads to access any information require
B. Kernel-Level Threads(KLT)
C. System Call Blocking 68. Process synchronization can be done on
D. User-Level Threads (ULT) A. hardware level

NARAYAN CHANGDER
B. software level
64. What is the priority of the thread in
the following Java Program? class C. both hardware and software level
multithreaded programing { pub- D. none of the mentioned
lic static void main(String args[]){
Thread t = Thread.currentThread(); Sys- 69. How many Types of synchronization ap-
tem.out.println(t); } } proaches are there under mutual exclu-
sion?
A. 4
A. 3
B. 5
B. 4
C. 0
C. 2
D. 1 D. 0
65. Thread is process that can run indepen- 70. The capability to control the access of mul-
dently tiple threads to any shared resource is
A. heavyweight called
B. lightweight A. Synchronization
C. compaction B. Multitasking

D. compression C. multithreading
D. None
66. Which of these are types of multitasking?
71. Which method we implement from
A. Process based
Runnable interface?
B. Thread based A. run ()
C. Both a & b B. start ()
D. None of the mentioned C. execute ()
67. What is synchronization in reference to a D. call ()
thread?
72. Execution of a java thread begins on which
A. It’s a process of handling situations method call?
when two or more threads need access to A. start ()
a shared resource
B. run ()
B. It’s a process by which many thread
are able to access same shared resource C. execute ()
simultaneously D. launch ()

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.1 Overview 185

73. Default priority value of a java thread is 78. synchronized instance methods acquire
A. 0 lock on

PRACTICE BOOK» NOT FOR SALE


B. 1 A. object
C. 5 B. class
D. 10 C. all
D. none
74. Thread synchronization in a process will be
required when 79. wakes up a thread that called wait()
A. All threads sharing the same address on same object.
space A. start()
B. All threads sharing the same global B. run()
variables
C. notify()
C. All threads sharing the same files
D. sleep()
D. All of these
80. Which of these statements is incorrect?
75. What will be the output of the program?
class Test implements Runnable { public A. By multithreading CPU’s idle time is
void run() { System.out.println(”Run”); minimized, and we can take maximum use
} } class Myclass { public static of it
void main(String[] args) { Thread B. By multitasking CPU’s idle time is min-
t1 = new Thread(); t1.start(); Sys- imized, and we can take maximum use of
tem.out.println(”Main”); } } it
A. Run C. Two thread in Java can have same pri-
B. Main ority
C. Compile Time Error D. A thread can exist only in two states,
running and blocked
D. Run Main
76. What is sometimes also called a 81. Min and Max priority of a thread in Java
lightweight process? multithreading are

A. Thread A. 1, 10
B. Process B. 0, 10
C. JVM C. 0, 255
D. none of above D. 1, 256

77. is a mechanism in which a thread is 82. and are the types of synchroniza-
paused running in its critical section and an- tion.
other thread is allowed to enter (or lock) in A. Process synchronization and thread
the same critical section to be executed.It synchronization
A. Inter thread communication B. multitasking and multithreading
B. Co-operation C. Interthread communication and mu-
C. option 1 or option 2 tual exclusion
D. None D. None

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Multicore Programming 186

83. Which statements is/are correct A. Linux


A. On calling Thread start ( ) method a B. Windows
new thread is created C. Android
B. Thread start( ) method call run( ) D. Mac OS X
method internally
C. Thread run( ) method can also be 87. It refers to the abstraction of a running
called directly to create thread program and has an independent resource

NARAYAN CHANGDER
D. both a & b A. Resource Ownership
B. Threads
84. An application begins with a single thread
and begins running in that thread. C. Process Execution

A. OS Dependent D. Process

B. Kernel-Level Threads(KLT) 88. Synchronized static methods acquire lock


C. System Call Blocking on

D. User-Level Threads (ULT) A. Class


B. Object
85. thread in java is a service provider
thread that provides services to the user C. Interface
thread. D. None
A. Producer thread 89. How many threads can a process contain?
B. Consumer thread A. 1
C. Daemon thread B. 0
D. None C. multiple
86. Supports Multithreading D. 2

4.2 Multicore Programming


1. If multiple threads are attempting to ac- B. distributed memory parallel program-
quire the same mutex at the same time, ming
then only one thread will succeed, and the
C. Both of above
other threads will have to wait. This situ-
ation is known as a D. None of above
A. Semaphore 3. Pthreads refers to:
B. Lock A. the POSIX defining an API for thread
C. Contended Mutex creation only
D. None of these B. the POSIX defining an API for thread
synchronization only
2. OpenMP program is an API for
C. the POSIX defining an API for thread
A. shared memory parallel programming implementation only

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Multicore Programming 187

D. the POSIX defining an API for thread C. MPI Bcast( & abc[4], 1, MPI
creation and synchronization INT, 0, comm)

PRACTICE BOOK» NOT FOR SALE


4. Which of the statement is true to avoid D. None of the others
data race? 8. pthread create( & threads id, NULL,
A. only one thread can update the vari- Hello world, NULL); creates a thread
able at a time. A. Called Hello world with default at-
B. Any number of threads update the vari- tributes
able parallely B. Called Hello world with all at-
C. Provide a synchronization lock around tributes set to NULL
all accesses to that variable and ensure C. Called Hello with all attributes set to
that before referencing the variable, the NULL
thread OO acquire the lock
D. none of above
D. Both a) and c)
9. Which one of the following is a synchro-
5. All writing procedures for same location nization tool?
are seen having same order; the stated
property is called A. thread

A. Write serialization B. pipe

B. Read serialization C. semaphore

C. Parallel processing D. socket

D. Synchronization 10. The method used to enable nested parallel


region is
6. Average memory access time can be calcu-
lated as A. omp nested()

A. Average memory access time = Hit B. omp get nested()


time + Miss rate? Miss penalty C. omp set nested
B. Average memory access time = Hit D. None of the above
time-Miss rate? Miss penalty
11. Messages can be placed into the until
C. Average memory access time = Hit they are processed and deleted
time + Miss rate Miss penalty
A. Stack
D. Average memory access time = Miss
rate? Miss penalty B. Queue
C. Tree
7. We want to do a simple broadcast of
variablefloat abc[4];in processor 0 to the D. Graph
same location in all other processors of the 12. In message passing a process receives in-
communicator. What is the correct syntax formation by executing the
of the call to do this broadcast?
A. Send
A. MPI Bcast( & abc[4], 1, MPI
REAL, 0, comm) B. Send Primitive

B. MPI Bcast( & abc, 4, MPI REAL, C. Receive


0, comm) D. Receive Primitive

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Multicore Programming 188

13. The difference of using threadSafeMalloc() 17. Tour and stack are
instead of malloc() is A. Linear data structure
A. Serialize the program B. Non linear data structure
B. multithreaded program to have only a C. Both a) and b)
single executing thread
D. None of the above
C. Parallelize the program
18. Interconnection networks are also called
D. Both a) and b)

NARAYAN CHANGDER
A. Communication subnets
14. occurs when two or more processes
B. Communication subsystems
continuallyrepeat the same interaction in
response to changes in the otherprocesses C. Cellular telecommunication
without doing any useful work D. Both a and b
A. Deadlock
19. Invoking periodically to test for deadlock
B. Livelock is one of the way for deadlock
C. Mutex Lock A. Prevention
D. Spin Lock B. Avoidance
C. Detection
15. MPI THREAD MULTIPLE
D. Deletion
A. Only one thread will execute
B. The process may be multi-threaded, 20. In only one process at a time is allowed
but only the main thread will make MPI into its critical section, among all processes
calls-all MPI calls are funneled to the main that have critical sections for the same re-
thread. source.
C. The process may be multi-threaded, A. Mutual Exclusion
and multiple threads may make MPI calls, B. Synchronization
but only one at a time. That is, calls are
C. Deadlock
not made concurrently from two distinct
threads as all MPI calls are serialized. D. Starvation
D. Multiple threads may call MPI with no 21. Which of the following statement is true
restrictions. about wrapper script?
16. The reason for the implementation of the A. Compiles the program
cache memory is B. Simplifies the running of compiler by
A. To increase the internal memory of the telling it where to find the necessary head-
system erfiles and which libraries to link with ob-
ject file
B. The difference in speeds of operation
of the processor and memory C. Execute the program

C. To reduce the memory access and cy- D. None of the above


cle time
22. Consider the code segment void update
D. All of the mentioned (int * a) { *a = *a + 4; } When two threads

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Multicore Programming 189

parallely update the variable a, Whether 27. Which of the following is the most appro-
data race occur or not. priate definition for a ‘GPU’?

PRACTICE BOOK» NOT FOR SALE


A. Data race not occur A. A specialised form of co-processor
which works alongside the main CPU-the
B. Data race occur
most common use is to aid graphics and
C. May be occur other specialised tasks
D. May not be occur B. The memory store where frequently
used instructions and data are stored in
23. Which of the following is the best defini- the CPU
tion for ‘SIMD’? C. A specialised form of co-processor
A. A single operation carried out on many which works alongside the main CPU-its
pieces of data at the same time only function is to support and aid in
graphical processing
B. Different instructions carried out at
the same time on different pieces of data D. A specialised form of processor that
performs pipelining
C. A single operation carried out on a sin-
gle piece of data at a time 28. Which of the following about OpenMP is
incorrect:
D. Different operations carried out on the
same piece of data at the same time A. OpenMP is an API that enables explicit
multi-threaded parallelism.
24. MPI Send and MPI Recv are B. The primary components of OpenMP
A. Collective Communication are compiler directives, runtime library,
and environment variables
B. Point to Point Communication
C. OpenMP implementations exist for the
C. Both a) and b) Microsoft Windows platform.
D. None of the above D. OpenMP is designed for distributed
memory parallel systems and guarantees
25. Signalling mechanism is efficient use of memory.
A. Mutex
29. Thread is a dispatch able unit of
B. Semaphore
A. Program
C. Both a) and b) B. Work
D. None of these C. Time
26. will specify the expectations of the D. Process
users of the system as well as penalties
30. The ability of the system to complete tasks
if the system fails to meet these expecta-
rather than on the duration of each individ-
tions.
ual task i
A. Class of Service A. Throughput
B. Quality of Service (QOS) B. Response time
C. Reliable metrics C. Reliability
D. None of these D. None of these

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Multicore Programming 190

31. In MPI global communication functions processor speed and efficiency in all situa-
that can involve more than two pro- tions?
cesses.These functions are called A. Multi-core processors are rarely used
A. Synchronous communication B. Many problems are not fully parallelis-
B. Asynchronous communication able
C. Collective communication C. Writing programs to take advantage of
multiple cores can be complex
D. None of the above

NARAYAN CHANGDER
D. There are overheads in terms of com-
32. Message queue is a form of munication between multiple cores
A. Synchronous service 37. Computer system of a parallel computer is
B. Asynchronous service capable of
C. Support both a) and b) A. Decentralized computing
D. None of these B. Parallel computing
C. Centralized computing
33. OpenMP assigns piece of computations to
D. Decentralized computing
A. Process 38. Paths that have an unbounded number
B. Thread of allowed nonminimal hops from packet
sources, this situation is referred to as
C. Program
A. Unblocking
D. All the above
B. Blocking
34. The difference between Pthreads and C. Livelock
OpenMP implementation is in
D. Deadlock
A. Parallelizing the inner loop
39. Writing parallel programs is referred to as
B. Parallelizing the outer loop
A. Parallel computation
C. Parallelizing both inner and outer loop
B. Parallel processes
D. None of the above
C. Parallel development
35. Synchronization is necessary D. Parallel programming
A. to ensure that shared resources are
40. Which of the following is suitable for
not accessed by multiple threads simulta-
‘thread’?
neously
A. Heavyweight process
B. All work on those resources is com-
plete before new work starts B. Lightweight process
C. Both a) and b) C. Process
D. None of these D. A task

36. Which of the following is NOT a reason 41. A semaphore is a shared integer variable
why doubling the number of processor
cores does not lead to a direct doubling of A. that can not drop below zero

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Multicore Programming 191

B. that can not be more than zero 47. The time to complete a single task is Z
C. that can not drop below one A. Response time

PRACTICE BOOK» NOT FOR SALE


D. that can not be more than one B. Reliability
C. None of these
42. What is MPI
D. none of above
A. Message Passing Interface
48. Scheme having set, in the cache as a group
B. Multidimensional Poverty Index of blocks, is known as
C. Minimal Polynomial Instantiation A. Set distributive
D. None of the above B. Principle of locality
C. Set associative
43. The format for MPI FINALIZE is
D. None of above
A. int MPI Finalize(void)
49. Execution of several activities at the same
B. char MPI Finalize(void) time.
C. int MPI Finalize(int) A. processing
D. int MPI Finalize(int, int) B. parallel processing
C. serial processing
44. Utility computing focuses on a model.
D. multitasking
A. Data
50. The communication metrics for evaluate
B. Cloud
the performance of parallel programming
C. Scalable is
D. Business A. Throughput
B. Response time
45. Amongst vector-vector operations (VV),
C. Both a) and b)
matrix-vector operations (MV) and
matrix-matrix operations (MM), which D. None of these
will benefit from spatial locality and which
51. For semaphores and binary semaphores, a
will benefit from temporal locality of the
is used to hold processes waiting on
code in the presence of a cache?
the semaphore.
A. Spatial:VV, ; Temporal:MV, MM A. Stack
B. Spatial:MV, MM ; Temporal:VV B. Queue
C. Spatial:MM ; Temporal:VV, MV, MM C. Tree
D. Spatial:VV, MV, MM ; Temporal:MM D. none of above
52. What are the flags that are passed while
46. Choose the types of synchronization?
compiling a pthread program using gcc?
A. Mutex
A. -pthread
B. Semaphore B. -lpthread
C. Locks C. -gccpthread
D. All the above D. -thread

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Multicore Programming 192

53. What locality does the following code 58. Which of the following statements is/are
havefor(i=0; i < N; i++) sum += x[i];? true about performance of reduced solver
and basic solver?
A. Temporal
A. The reduced MPI solver makes much
B. Iterative
more efficient use of memory than the ba-
C. Spatial sic MPI solver
D. Temporal and Spatial B. The basic solver must provide storage
for all n positions on each process, while

NARAYAN CHANGDER
54. The average time required to reach a stor- the reduced solver only needs extra stor-
age location in memory and obtain its con- age for n=comm sz positions and
tents is called n=comm sz forces
A. Latency time. C. Both a) and b)
B. Turnaround time. D. None of the above
C. Access time. 59. used to coordinate the activity of mul-
D. Response time. tiple threads.
A. Asynchronization
55. An operation being done in a way that in-
B. Synchronization
tervening operation can be occurred, this
operation is called a C. Concurrence
A. Atomic D. None of these

B. Molecular 60. The data type used for storing the thread
id is
C. Multitasking
A. pthread t
D. Serial processing
B. p thread t
56. What is the output of the following C. pthread id
code when run with OMP NUM
D. pthread
THREADS=4? main(..) { static int arr[4]
= {1, 2, 3, 4} ; int x=1, j ; #pragma omp 61. Domain and functional decomposition
parallel for reduction(*:x) for(j=0 ; j<4 ; are considered in the following parallel
j++) x *= arr[j] ; printf( “%d”, x ) ; } methodological design elements, EXCE PT:
A. 24 A. Partitioning
B. 10 B. Communication
C. 0 C. Agglomeration

D. 4 D. Mapping
62. Which of the following is/are type of col-
57. Named pipe is
lective communication?
A. File like objects A. Broadcast
B. Tree like objects B. Reduction
C. Graph like objec C. Gather
D. All the above D. All the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Multicore Programming 193

63. A thread waiting to acquire a will keep C. Distributed shared memory


trying to acquire the lock without sleeping. D. Shared memory

PRACTICE BOOK» NOT FOR SALE


A. Mutex lock
68. What does the nowait clause do?
B. Contended Lock
A. Skips to the next OpenMP construct
C. Spin Lock
B. Prioritizes the following OpenMP con-
D. Binary lock struct
64. To avoid deadlock, which of the statement C. Removes the synchronization barrier
is true from the previous construct
A. Ensure that threads always acquire D. Removes the synchronization barrier
the locks in the same order for the current construct
B. Ensure that threads always acquire 69. Each thread also has access to another
the locks in the different order type of memory that must not be accessed
C. Order is not important by other threads is called
D. None of these A. threadprivate memory
B. threadshared memory
65. are counters that can be either incre-
C. threadparallel memory
mented or decremented which can be used
in situations where there is a finite limit D. None of the above
to a resource and a mechanism is needed
70. In distributed system, each processor has
to impose that limi
its own
A. Lock
A. local memory
B. Mutex
B. clock
C. Semaphore C. both local memory and clock
D. None of these D. none of the mentioned
66. How do threads communicate with each 71. pthread self returns
other?
A. The thread id
A. Threads cannot communicate with
B. The thread attribute
each other.
C. Thread data
B. Threads communicate with each other
by wait(), notify() and notifyAll() methods. D. Thread running time
C. Threads communicate with each other 72. Effective bandwidth delivered end-to-end
through stack. by network to an application is upper
D. Threads communicate with each other bounded by minimum across all three po-
through queue. tential bottleneck areas:
A. Effective bandwidth = min(BW Net-
67. Alternative design technique consists of workInjection, BW Network, BW Net-
multiprocessors having physically dis- workReception)
tributed memory, called
B. Effective bandwidth = max(BW Net-
A. Warehouse-scale workInjection, BW Network, BW Net-
B. Static memory access workReception)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Multicore Programming 194

78. We have an internet cloud of resources In


C. Effective bandwidth = min(BWNetworkInjection
+ BWNetwork, BWNetworkReception) cloud computing to form
D. Effective bandwidth = max(BWNetworkInjection A. Centralized computing
+ BWNetwork, BWNetworkReception) B. Decentralized computing

73. To update cached copies of data item; is C. Parallel computing


alternative protocol which is known as D. All of these
A. Write update

NARAYAN CHANGDER
79. By default local variables in Pthreads are
B. Write broadcast protocol , so all shared variables are global in
the Pthreads version.=
C. Read protocol
A. Public
D. both a and b
B. Private
74. Efficiency is C. Protected
A. E= S D. Static
B. E= S/P 80. Data centers and centralized computing
C. E= P covers many and
D. E= P/S A. Microcomputers
B. Minicomputers
75. Named pipe is called
C. Mainframe computers
A. LIFO
D. Supercomputers
B. FIFO
81. is a closed chain of processes exists,
C. FCFS such that each process holds at least one
D. None of these resource needed by the next process in the
chain.
76. Which of the following is the type of A. Mutual Exclusion
semaphore?
B. Hold and Wait
A. Binary semaphore
C. Preemption
B. Counting semaphore
D. Circular Wait
C. Both a) and b)
82. The time required to create a new thread
D. None of these in an existing process is
77. Binary Search works best on A. greater than the time required to cre-
ate a new process
A. Equally effective on sorted and un-
sorted lists B. less than the time required to create a
new process
B. Unsorted lists
C. equal to the time required to create a
C. Sorted lists new process
D. None of the above D. none of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Multicore Programming 195

83. .... is the measure of how much computa- C. Stack


tion a program will perform when using a D. Queu
particular algorithm.

PRACTICE BOOK» NOT FOR SALE


A. Algorithm complexity 89. Which of the following OpenMP directives
is used incorrectly:
B. Linear complexity
A. #pragma omp for nowait
C. Cubic complexity
B. #pragma omp parallel pri-
D. None of the above
vate(threadID)
84. Distributed program in a distributed com- C. #pragma omp atomic(threadID)
puter running a is known as
D. #pragma omp parallel for if (val)
A. Distributed process
B. Distributed program 90. A direct-mapped cache has only 1
block/set and a
C. Distributed application
A. Partially associative
D. Distributed computing
B. Half associative
85. Interprocessor communication that takes
C. Fully associative
place
D. Fully distributive
A. Centralized memory
B. Shared memory 91. Which of the following methods is/are de-
C. Message passing fined in Object class?

D. Both A and B A. wait()


B. sleep()
86. Two threads can be compared using the
API C. stop()
A. compare pthreads D. Both options (A) and (B)
B. pthread equal 92. Among the arguments passed to pthread
C. equal pthread API pthread create the final argument,
is.
D. pthread compare
A. Attributes of the thread
87. Dynamic networks of networks, is a dy-
namic connection that grows is called B. Name of the thread

A. Multithreading C. Data being passed to the thread

B. Cyber cycle D. Thread id


C. Internet of things 93. The region of code between the acquisition
D. Cyber-physical system and release of a mutex lock is called
A. Parallel region
88. A is a collection of vertices and edges
or line segments joining pairs of vertices. B. Critical region
A. Tree C. Both a) and b)
B. Graph D. None of these

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Multicore Programming 196

94. Which of the following would not be a rec- 100. when a process leaves a critical sec-
ommended use for a GPU? tion and more than one process is waiting,
A. Handling Operating System requests the selection of a waiting process is arbi-
trary
B. Password cracking
A. Busy waiting is employed
C. Weather modelling
B. Starvation is possible
D. Graphics rendering
C. Deadlock is possible

NARAYAN CHANGDER
95. Choose the tools to detect data race?
D. All of the above
A. Helgrind tool
B. Thread Analyzer 101. In which application system Distributed
C. Both a) and b) systems can run well?

D. None of these A. HPC


B. HTC
96. When two or more threads cannot make
progress because the resources that they C. HRC
need are held by the other threads.This sit- D. Both A and B
uation is called
A. Deadlock 102. In the coherent multiprocessor, caches
B. Livelock that is present provides both the migration
and
C. Mutexlock
A. Coherence
D. Spin Lock
B. Recurrence
97. MPI SHORT usage?
C. Replication
A. short int
D. Uniformity
B. short
C. int 103. In TSP problem, the memory is re-
D. none of above quired to allocating storage for a new
tour and copying the existing tour is time-
98. Broadcast communication in MPI is consuming
A. Point to Point Communication A. More
B. Collective Communication B. Less
C. Both a) and b) C. No memory
D. None of the above D. none of above
99. In distributed systems, link and site failure
104. “MP”in OpenMP stands for
is detected by
A. polling A. Multiprogramming

B. handshaking B. Multithreading
C. token passing C. Multiprocessing
D. none of the mentioned D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Multicore Programming 197

105. Locking mechanism is 111. Which of the following command deter-


A. Mutex mines the size of the group associated
with acommunicator?

PRACTICE BOOK» NOT FOR SALE


B. Semaphore
A. MPI COMM WORLD
C. Both a) and b)
B. MPI COMM SIZE
D. None of these
C. MPI COMM RANK
106. In a , the edges are oriented-one end D. MPI COMM GROUP
of each edge is the tail, and the other is
the head 112. What is the output of the following
A. Directed graph code when run with OMP NUM
THREADS=4? main(..){static int arr[4] =
B. Undirected graph {1, 2, 3, 4} ;int x=1, j ;#pragma omp par-
C. Cyclic graph allel for reduction(*:x)for(j=0 ; j<4 ; j++)x
D. None of the above *= arr[j] ;printf( “%d”, x ) ;}
A. 24
107. SCSI system organization Quiz
B. 10
A. small common-system interface
C. 0
B. small common-system interaction
D. 4
C. small computer-system interface
D. small computer-system interaction 113. If a process is executing in its critical sec-
tion, then no other processes can be exe-
108. Which of the following parallel method- cuting in their critical section. This condi-
ological design elements focuses on rec- tion is called?
ognizing opportunities for parallel execu- A. mutual exclusion
tion?
B. critical exclusion
A. Partitioning
C. synchronous exclusion
B. Communication
D. asynchronous exclusion
C. Aggromeration
D. Mapping 114. Which of the algorithms are used for iden-
tifying which subtrees we assign to the
109. SPMD stands for processes or threads?
A. Single process, Multiple Data A. Depth first search
B. Single program, Multiple Design B. Breadth first search
C. Single program, Multiple Data C. Both a) and b
D. None of the above D. None of the above
110. What header file contains prototype of 115. Significant characteristics of Distributed
MPI functions? systems have of
A. #include<omp.h> A. 5 types
B. #include<mpi.h> B. 2 types
C. #include<mpc.h> C. 3 types
D. #include<mpf.h> D. 4 types

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Multicore Programming 198

116. Microprocessors which are directly con- B. Efficiency is the ratio of the serial run
nected memory to a single-chip, that is time of the best sequential algorithm for
sometimes called as solving a problem to the time taken by the
A. Backside parallel algorithm to solve the same prob-
lem on p processors
B. Memory bus
C. Run time is the time that elapses from
C. Kernel the moment a parallel computation starts
D. both a and b to the moment the last processor finishes.

NARAYAN CHANGDER
117. A type of parallelism that uses micro ar- D. Superlinear is the fraction of time for
chitectural techniques. which a processor is usefully employed

A. instructional 122. The handling of keyboard presses and


mouse moves are performed through the
B. bit level
C. bit based
A. Locking mechanisms
D. increasing
B. Signalling mechanisms
118. Pthreads refers to POSIX standard defin- C. Event mechanisms
ing an API for thread creation and
D. None of these
A. Synchronization
123. The POSIX stand for
B. deletion
A. post operating system interface exten-
C. Processing
tion
D. Communication Mode
B. portable operting system inter pro-
119. Choose the predefined MPI data type cess comunication
A. MPI UNSIGNED LONG C. programmable operting system inter-
action
B. MPI BYTE
D. portable operting system interface
C. MPI PACKED
D. All the above 124. MPI derived datatypes
A. MPI INT
120. Which of these parallel programming er-
rors is impossible in the given OpenMP B. MPI CHAR
construct? C. MPI DOUBLE
A. Data dependency in #pragma omp for D. All the mentioned above
B. Data conflict in #pragma omp critical 125. Only one node having a cache block copy,
C. Data race in #pragma omp parallel and this cache has written block, and this
D. Deadlock in #pragma omp parallel memory copy is out of date. Then proces-
sor is called the
121. Choose the most accurate (CORRECT) A. Host
statement:
B. Owner
A. Scalability is a measure of the capacity
to increase speedup in proportion to the C. Guest
number of processors D. Server

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Multicore Programming 199

126. To update the cached copies of the data 131. Which of the following statement is/are
item; is the alternative protocol which is true about critical metrics and their expec-
known as tation early inthe design?

PRACTICE BOOK» NOT FOR SALE


A. Write update A. Clearly specified requirements
B. Write broadcast protocol B. Knowing what metrics are expected.

C. Read protocol C. Knowing what the inputs to the system


D. All the above
D. both a and b
132. Virtualization that creates one single ad-
127. Term which is named as shared memory dress space architecture that of, is called
with both SMP and DSM referring that ad-
dress space is A. Loosely coupled
B. Peer-to-Peer
A. Multi-threading
C. Space-based
B. Recurrence
D. Tightly coupled
C. Dedicated
133. The output to the n-body solver is
D. Shared memory
A. Position and mass
128. In an n-body problem, we need to find the B. Mass and velocities
of a collection of interacting particles
C. Position and velocities
over a period of time
D. None of the above
A. positions and mass
B. positions and velocities 134. When several processes access the same
data concurrently and the outcome of the
C. mass and velocities execution depends on the particular order
D. None of the above in which the access takes place, is called?
A. dynamic condition
129. If one site fails in distributed system then
B. race condition
A. the remaining sites can continue oper- C. essential condition
ating
D. critical condition
B. all the sites will stop working
135. Symmetric multiprocessors architectures,
C. directly connected sites will stop work-
are sometimes known as
ing
A. Uniform memory access
D. none of the mentioned
B. Static memory access
130. When the event for which a thread is C. Variable memory access
blocked occurs?
D. All above
A. thread moves to the ready queue
136. Resources and clients transparency that
B. thread remains blocked allows movement within a system is called
C. thread completes A. Mobility transparency
D. a new thread is provided B. Concurrency transparency

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Multicore Programming 200

C. Performance transparency not made concurrently from two distinct


D. Replication transparency threads as all MPI calls are serialized.
D. Multiple threads may call MPI with no
137. Termination of the process terminates restrictions. Multiple threads may call
A. first thread of the process MPI with no restrictions.
B. first two threads of the process 142. Which of the following level of a thread is
C. all threads within the process the fastest to create and manage thread?

NARAYAN CHANGDER
D. no thread within the process A. Many-to-Many
B. Many-to-One
138. Cache not able of containing the entire
C. Kernel
blocks needed while execution of a pro-
gram, is known as D. User
A. Cache full 143. Type of network that is used for interpro-
B. Cache hit cessor and processor-memory interconnec-
tions within multiprocessor, are
C. Hit rate
A. System/storage area networks
D. Cache misses
B. Local area networks
139. Private data that is used by a single- C. Wide area networks
processor, then shared data are used by
D. None of above
A. Single processor
144. A parallelism based on increasing proces-
B. Multi processor
sor word size.
C. Single tasking
A. Increasing
D. Multi tasking
B. Count based
140. Which header file needs to be used for C. Bit based
pthread programming? D. Bit level
A. pthread.h
145. Which one of the following is not shared
B. pthreads.h by threads?
C. p thread.h A. program counter
D. posix.h B. stack
141. MPI THREAD SERIALIZED C. both program counter and stack
A. Only one thread will execute. D. none of the mentioned

B. The process may be multi-threaded, 146. What data structures used for serial im-
but only the main thread will make MPI plementation?
calls-all MPI calls are funneled to the main A. Tour
thread.
B. Digraph
C. The process may be multi-threaded,
and multiple threads may make MPI calls, C. Stack
but only one at a time. That is, calls are D. All the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Multicore Programming 201

147. Particular block’s statuses of physical 152. A term for simultaneous access to a re-
memory are normally kept in one location, source, physical or logical.
called

PRACTICE BOOK» NOT FOR SALE


A. Multiprogramming
A. Register B. Multitasking
B. Directory C. Threads
C. Stack D. Concurrency
D. Queue
153. Which of the followings is the BEST de-
148. Which of the following APIs can be used scription of Message Passing Interface
for synchronization between threads (MPI)?
A. pthread exit A. A specification of a shared memory li-
brary
B. pthread join
B. MPI uses objects called communica-
C. pthread cancel tors and groups to define which collection
D. pthread self of processes may communicate with each
other
149. MPI Derived Data types allow you to
C. Only communicators and not groups
specify:
are accessible to the programmer only by
A. non-contiguous data of a single type a “handle”
B. contiguous data of mixed type D. A communicator is an ordered set of
C. non-contiguous data of mixed types processes
D. all of them 154. What Is Shared-memory Architecture?

150. To enforce two functions are provided A. A space is visible to all execution
enter-critical and exit-critical, where each threads.
function takes as an argument the name of B. A multi address space is visible to all
the resource that is the subject of competi- execution threads.
tion. C. A address space is visible to all execu-
A. Mutual Exclusion tion threads.
B. Synchronization D. A single address space is visible to all
execution threads.
C. Deadlock
D. Starvation 155. is duplex pipe that provides communi-
cation between the pipe server and some
151. cannot be done arbitrary and espe- pipe clients.
cially when data resources are involved,
A. Message queue
must be supported by a rollback recovery
mechanism. B. Named pipes
A. Mutual Exclusion C. Unnamed pipes
B. Hold and Wait D. None of these

C. Preemption 156. MPI stands for


D. Circular Wait A. Message Passing Interface

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.2 Multicore Programming 202

B. Message Passing Information B. Hometown


C. Method Passing Interaction C. Besttour
D. Method Passing Interface D. All the above
157. MPI THREAD FUNNELED 162. What is OpenMP?
A. Only one thread will execute.
A. OpenMP = Open Multi-threading
B. The process may be multi-threaded,
B. OpenMP = Open Multi-tasking

NARAYAN CHANGDER
but only the main thread will make MPI
calls-all MPI calls are funneled to the main C. Multi tasking
thread.
D. OpenMP = Open Multi-processing
C. The process may be multi-threaded,
and multiple threads may make MPI calls, 163. Tightly coupled set of threads’ execution
but only one at a time. That is, calls are working on a single task, that is called
not made concurrently from two distinct A. Multithreading
threads as all MPI calls are serialized.
B. Recurrence
D. Multiple threads may call MPI with no
restrictions. C. Parallel processing

158. The amount of time that the system is un- D. Serial processing
available, typically called
164. A process can be
A. Reliability
A. single threaded
B. Latency
B. multithreaded
C. Availabilty
C. both single threaded and multi-
D. Bandwidth
threaded
159. Uniprocessor computing devices is called D. none of the mentioned

A. Grid computing 165. No blocking occurs as links are not shared


among paths to unique destinations, cross-
B. Centralized computing bar, therefore, is
C. Parallel computing
A. Non-blocking
D. Distributed computing
B. Blocking
160. Data access and storage are elements of C. logk stages
Job throughput, of
D. 2logk N stages
A. Flexibility
B. Adaptation 166. Input to the n-body solver is of each
C. Efficiency particle.

D. Dependability A. Position and Velocities


B. Mass and Positions
161. The global variables for recursive depth
first search are C. Mass, Position and Velocities
A. Digraph D. Mass and Velocities

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.3 high performance computing 203

4.3 high performance computing

PRACTICE BOOK» NOT FOR SALE


1. What tool can I use to leave a program 6. The method will be executed once the
running in the console? thread’s method is called.
A. HTOP A. EventBegin
B. TMUX B. EventStart
C. LSOF C. Begin
D. RSYNC
D. Start
2. What parallel programming models ex-
ist? 7. Data Center cooling is necessary for:

A. Passage of Messages A. Reduce power consumption


B. Hylos or Pthreads B. Ensure the availability of IT equipment
C. OpenMP C. Maintain people’s comfort
D. openc D. Avoid loss of information

3. What job and resource managers are 8. In the threads model of parallel program-
there? ming
A. Slurm A. A single process can have multiple,
B. PBS Pro concurrent execution paths
C. LSF B. A single process can have single, con-
D. Torque current execution paths.
C. A multiple process can have single con-
4. What does Moore’s law propose?
current execution paths.
A. The number of transistors on a mi-
crochip will double every year. D. None of these

B. The cost of manufacturing will de- 9. What is the function of the iperf com-
crease each year mand?
C. The performance of a processor will A. Measure CPU performance
double every 2 years
B. Measure RAM performance
D. The number of cores in a processor
will double every 3 years. C. Measure GPU performance

5. What types of performance limitations can D. Measure network performance


I encounter when solving an HPC prob-
10. What is the L2 Cache?
lem?
A. CPU A. It is the cache of instructions and data

B. Memory B. Generic cache NOT shared by all cores


C. O/O C. Generic cache shared by all kernels
D. communications D. Shared cache between RAM and CPU

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.3 high performance computing 204

11. In a TIG monitoring system: what role 17. What is the performance issue that affects
does Telegraf play? MPI the most?
A. Get the metrics A. Memory
B. Store the metrics B. CPU
C. Process the Metrics C. communications
D. Display Metrics D. O/O

18. My parallel program has terrible perfor-

NARAYAN CHANGDER
12. If the execution time of a basic instruction
in a core takes 1 second: How long does mance, what tool can I use to detect the
it take to access the L3 cache? problem?
A. 1 second A. Debugger GDB
B. 3 seconds B. HTOP
C. 9 seconds C. Compiler
D. 43 seconds D. IO Top

13. LMOD configuration scripts are written in 19. Why has the speed of processors remained
the language? relatively constant in the last 5 years?
A. Lua A. Manufacturing Cost
B. HTML B. Energy consumption
C. JS C. Heat Generation
D. Python D. Number of Cores

14. What BMC systems are the most used? 20. Parallel programming:
A. Integrated Lights-Out (iLO) A. The execution speed increases propor-
tionally to the number of processors.
B. Dell Remote Access Controller (idRAC)
B. Requires extra programming effort for
C. RPI Remote Controller
inter-thread communication
D. ARM64 Connection
C. Makes sequential programming easier
15. which of the following is a an example of D. Allows the execution of a sequential
data decomposition process more quickly
A. matrix multiplication
21. What types of parallelism exist?
B. merge sort A. Level of instruction
C. quick sort B. Data Level
D. 5 puzzal C. Task Level
16. Parallel Programming models are: D. Communications Level
A. Shared Memory Systems 22. In the TOP 500 of June 2022, to which
B. Distributed Memory Systems country did the 1◦ place belong?
C. Shared Communications Systems A. Frontier and the United States
D. Distributed Storage Systems B. Fugaku in Japan

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Thread Libraries 205

C. Snow and Finlandia published by the manufacturers of a spe-


D. Sunway TaihuLight de China cific processor.

PRACTICE BOOK» NOT FOR SALE


D. It is the calculation of the speed of a
23. What is the speedup factor? processor
A. It is the improvement in the perfor-
24. What is the instruction execution cycle in-
mance of a task by changing the number
side a processor?
of cores
A. Fetch, Decode, Execute, Save
B. It is a value that goes between 0 and
1 and indicates the efficiency of a parallel B. Save, Decode, Execute, Fetch
program C. Decode, Save, Execute, Fetch
C. It is the measurement of the cores D. Fetch, Save, Decode, Execute

4.4 Thread Libraries


1. class ThreadDemo extends Thread { public 4. Select the Correct statement about multi-
static void main(String [] args) { Thread- threading.
Demo t = new ThreadDemo(); t.start();
A. It is the ability of a processor to exe-
System.out.print(”one. “); t.start(); Sys-
cute multiple threads concurrently
tem.out.print(”two. “); } public void run()
{ System.out.print(”Thread “); }} B. It allows the program to speed up the
A. An exception occurs at runtime. execution
B. Compilation fails. C. Threads within the same process can
share the memory and resources of the
C. . It prints “Thread one. Thread two. “.
main thread.
D. The output cannot be determined.
D. Multiple threads work together to
2. Why is it a good idea to use a Thread- achieve a common goal
PoolExecutor as a context manager when
you can? 5. How to terminate a blocking thread?
A. It looks better A. thread.stop() & thread.wait()
B. t passes exceptions back to the main
B. thread.stop()
program
C. It manages the start up of all threads C. thread.terminate()
and waits for them all to complete D. None
D. It prevents the threads from having
race conditions 6. How does global value mutation used for
thread-safety?
3. What does the Thread.join() method do?
A. via GIL (Global Interpreter Lock)
A. Adds the thread to a pool
B. Merges two threads into one B. via Locking

C. Waits for the thread to finish C. via Mutex


D. Restricts access to a resource D. None

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Thread Libraries 206

7. Race conditions are 12. Which method is used to identify a


A. Two threads incorrectly accessing a thread?
shared resource A. getThread()
B. Testing which thread completes first B. None
C. Something you should add to your code C. getName()
D. The weather on race day D. get ident()

NARAYAN CHANGDER
8. What the two different types of thread? 13. class A implements Runnable{public void
A. Kernel thread run(){try{for(int i=0;i<4;i++){Thread.sleep(100);System.out.p
e){}}}public class Test{public static void
B. Device thread main(String argv[]) throws Excep-
C. User thread tion{A a = new A();Thread t = new
Thread(a, “A”);Thread t1 = new Thread(a,
D. Network thread
“B”);t.start();t.join();t1.start();}}
9. Q) True statement about process and A. Compilation succeed but Runtime Ex-
thread is/areMore than one answer ception
A. If a child process crashes all main pro- B. A B A B A B A B
cess will also be crashed
C. Output order is not guaranteed
B. If a child thread is crash entire pro-
D. A A A A B B B B
cess will crash
C. Threads have their own memory stack 14. A single sequential flow of control within
a program is
D. Each process has different virtual
space A. Process
B. Task
10. How does run() method is invoked?
C. Thread
A. By Thread.run()
D. Structure
B. By Thread.start()
C. By Thread.create() 15. class multithreaded programing {
public static void main(String args[]) {
D. None
Thread t = Thread.currentThread(); Sys-
11. public class Test extends Thread{2. pub- tem.out.println(t); } } output of this code
lic static void main(String argv[]){3. is
Test t = new Test();4. t.run();5. A. Thread[5, main]
t.start();6. }7. public void run(){8.
System.out.println(”run-test”);9. }10. } B. Thread[main, 5]

A. run-test run-test C. Thread[main, 0]

B. run-test D. Thread[main, 5, main]

C. Compilation fails due to an error on 16. Q) Which statements is/are correct (More
line 4 than one is correct) .
D. Compilation fails due to an error on A. On calling Thread start () method a
line 7 new thread get created.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Thread Libraries 207

B. Thread start () method call run () 20. Which thread method is used to wait until
method internally it terminates?

PRACTICE BOOK» NOT FOR SALE


C. Thread run () method can also be A. waitforthread()
called directly to create thread. B. join()
D. All correct C. None

17. What is true about acquiring object lock D. wait()


before calling wait(), notify() and noti- 21. What are the two modules in python 3.x
fyAll()? used for thread implementation?
A. it’s mandatory to acquire object lock A. thread
before calling wait(), notify() and noti-
fyAll() methods on object B. threading
C. thread
B. If we call wait(), notify() and notifyAll()
methods without acquiring object lock D. Threading
i.e. from outside synchronize block then
22. Which of these method of Thread class is
javlang.IllegalMonitorStateException is
used to find out the priority given to a
thrown at runtime.
thread?
C. wait(), notify() and notifyAll() methods
A. get()
are always called from Synchronized block
only B. ThreadPriority()
D. all of these C. getPriority()
D. getThreadPriority()
18. What is valid about threads
23. Select the correct statement to create a
A. Threads have their own heap allocated
new thread in python 3.x using thread
are
module
B. Threads have their own stack. A. thread.start new thread ( func-
C. Threads doesn’t have own stack. tion, args[, kwargs] )
D. None B. -thread.start new thread ( func-
tion, args[, kwargs] )
19. What are valid statements for suspend() C. thread.start new thread (
and resume() method? function, args[, kwargs] )
A. Suspend() method is deadlock prone. D. thread.new thread ( function,
B. If the target thread holds a lock on ob- args[, kwargs] )
ject when it is suspended, no thread can
24. How many CPUs (or cores) will the Python
lock this object until the target thread is
threading library take advantage of simul-
resume
taneously?
C. If the thread that would resume the A. Two
target thread attempts to lock this mon-
itor prior to calling resume, it results in B. One
deadlock formation. C. None
D. All D. All of the available CPUs

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Thread Libraries 208

25. How can you ensure all threads that C. mainThread-0Thread-1


started from main must end in order in D. Thread-0Thread-1Thread-2
which they started and also main should
end in last 30. What is the method to retrieve the list of
A. join() method all active threads?
B. sleep() method A. getList()
C. wait() method B. getThreads()

NARAYAN CHANGDER
D. run() method C. enumerate()
D. threads()
26. Which of these is valid about threads in
java 31. What are the libraries in Python that sup-
A. Thread behaviour is unpredictable port threads?
B. execution of Threads depends on A. threading
Thread scheduler B. th
C. Same threading program may produce C. None
different output in subsequent executions
D. thread
even on same platform
D. All of these 32. Which method returns the count of active
threads in the caller’s thread control?
27. A method used to force one thread to wait
A. threading.activeCount()
for another thread to finish.
B. threading.currentThread()
A. join()
C. threading.enumerate()
B. connect()
D. All the above
C. combine()
D. concat() 33. What are valid points about thread

28. How can we create Thread A. Thread are subdivision of Process.

A. By Extending Thread class B. One or more Threads runs in the con-


text of process.
B. Implementing Runnable interface
C. Threads can execute any part of pro-
C. By using Executor framework-which cess. And same part of
can internally form threads
D. process can be executed by multiple
D. All of these Threads.
29. class MyThread implements Runnable { 34. How can Thread go from waiting to
public void run() { System.out.println(Thread.currentThread().getName());
runnable state?
}}public class ThreadTest { public static void
main(String arg[]) { Thread thread = new A. notify/notifAll
Thread(new MyThread()); thread.run(); B. When sleep time is up
thread.run(); thread.start(); }} C. Using resume() method when thread
A. mainmainThread-0 was suspended
B. Thread-0mainThread-1 D. All

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


4.4 Thread Libraries 209

35. What state does Thread enter in when it 40. A thread can acquire a lock by using which
has been created and started? reserved keyword?

PRACTICE BOOK» NOT FOR SALE


A. New A. volatile
B. Runnable B. synchronized
C. Running C. locked
D. Waiting D. none
36. Multithreading is also called as 41. What code is missing? public class
A. Concurrency MyRunnable implements Runnable{public
B. Simultaneity void run(){// some code here}}

C. Crosscurrent A. new Thread(MyRunnable).run();

D. Recurrent B. new Runnable(MyRunnable).start();


C. new Thread(new MyRunnable()).start();
37. Which method can be used to find whether
Thread hasn’t entered dead state?
D. new MyRunnable().start();
A. isAlive()
B. isRunning() 42. Which of the following line of code is
suitable to start a thread? class Demo
C. isNotDead
implements Runnable{public void run()
D. All {System.out.println(“Thread is in Running
state”);}public static void main(String
38. Which method restarts the thread
args[]){/* Missing code? */}}
A. start()
A. Demo obj = new Demo();Thread tobj
B. restart() = new Thread(obj);tobj.start();
C. restartThread() B. Thread t = new Thread(X);t.start();
D. none C. Thread t = new Thread(Demo);
39. What are valid point about processes D. Thread t = new Thread();Demo.run();
A. Processes have their own copy of the
43. Which is thread safe?
data segment of the parent process
A. StringBuffer
B. Threads have direct access to the data
segment of its process B. StringBuilder
C. Processes have their own address C. Both StringBuffer & StringBuilder
D. All of these D. None

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5. Process Synchronization

NARAYAN CHANGDER
5.1 Overview
1. Choose TWO(2) ways of critical section 4. Provide TWO(2) issue in implementing
problem can be resolved based on hard- semaphore in Symmetric Multiprocessor
ware solution (SMP)
A. lock A. spinlocks
B. bounded buffer B. deadlock
C. mutex locks C. mutex locks
D. semaphore D. starvation
2. The value of can range over an unre- 5. A monitor is a module that encapsulates
stricted domain a) b) c) d)
A. binary semaphore
A. shared data structures
B. counting semaphore
B. procedures that operate on shared
C. semaphore mutex data structure
D. semaphore spinlocks C. synchronization between concurrent
procedure invocation
3. is situation occurs when a device or
system attempts to perform two or more D. all of the mentioned
operations at the same time, but because
of the nature of the device or system, the 6. Choose TWO(2) way of critical section
operations must be done in the proper se- problem can be resolved based on soft-
quence to be done correctly. ware solution
A. critical value A. locks
B. race condition B. Interrupt based solution
C. bounded buffer C. mutex locks
D. multiracing condition D. Peterson’s solution

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.1 Overview 211

7. Bounded waiting implies that there exists 12. Buffer works as a shared memory, and
a bound on the number of times a process counter keeps track of the number of full
is allowed to enter its critical section: buffers. Counter is by the after it

PRACTICE BOOK» NOT FOR SALE


A. after a process has made a request to produces a new buffer, and is by the
enter its critical section and before the re- after it consumes a buffer.
quest is granted A. decremented, producer, incremented,
B. when another process is in its critical consumer
section B. decremented, consumer, incremented,
C. before a process has made a request producer
to enter its critical section C. incremented, producer, decremented,
D. None of these consumer

8. Which one of the cs requirement that test D. incremented, consumer, decremented,


and set algorithm met? producer

A. mutual exclusion and progress 13. A situation where several processes ac-
B. mutual exclusion and bounded waiting cess and manipulate the same data concur-
rently and the outcome of the execution
C. progress and bounded waiting
depends on the particular order in which
D. mutual exclusion, progress and access takes place is called:
bounded waiting
A. data consistency
9. The following is not an algorithm used to B. race condition
prevent race conditions from occurring in
process synchronization C. aging

A. Peterson Solutions D. starvation


B. Test and Set Lock 14. Incorrect use of semaphore can lead to
C. Semaphore and
D. There are no right answers A. starvation, busy waiting

10. When semaphore s = 0, process must con- B. deadlock, busy waiting


stantly check to see if semaphore is not C. deadlock, starvation
zero so that it can enters cs. This is D. bounded waiting, starvation
A. mutual exclusion
15. An un-interruptible unit is known as:
B. bounded waiting
A. single
C. progress
D. busy waiting B. atomic
C. static
11. The critical sections problems must fulfill
THREE(3) requirements. What are they? D. None of these
A. bounded waiting 16. Name TWO(2) standard atomic operations
B. mutual exclusion that used in semaphore
C. race condition A. signal () functions
D. progress B. test compare () functions

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.1 Overview 212

C. compare swap () functions shared data and the outcome depends on


D. wait () functions the order of data access
B. A situation whereby multiple threads
17. Entry section to cs is to and exit sec- access a data item without coordination
tion is to in a multithreaded application
A. enable interrupts, disable interrupts C. Coordinating the activities of two or
B. enable interrupts, progress interrupts more processes is the solution to race
condition

NARAYAN CHANGDER
C. disable interrupts, enable interrupts
D. progress interrupts, enable interrupts D. The process of coordinating the activ-
ities of two or more processes is called
18. For cooperating process, process pro- process coordination
duces information that is consumed by a
process. 22. Semaphore is suitable implement in which
environment?
A. consumer, producer
A. single processor
B. producer, consumer
B. random access processor
C. independent, consumer
C. multiprocessor
D. cooperating, consumer
D. sequential access processor
19. Modern machines provide special atomic
hardware instructions to implement locks. 23. In Peterson’s algorithm, two processes
What does it mean by atomic? share two variables which are turn and
flag. What does variable turn do?
A. non-interruptible
A. to indicate if a process is ready to en-
B. preemption ter the cs
C. concurrent B. to indicate if a process is doing busy
D. preserved waiting

20. To enable producer and consumer to exe- C. to indicate whose turn is it to wait
cute concurrently, a buffer must be used. D. to indicate whose turn it is to enter the
What is the buffer for? cs
A. For producer to put data while con- 24. to protect critical regions and thus pre-
sumer access it vent race conditions among the processess
B. For consumer to put data while pro- A. race condition
ducer access it
B. critical section
C. For producer to run data while con-
sumer retrieve it C. mutex locks

D. For consumer to run data while pro- D. semaphore


ducer retrieve it 25. Why do we need process synchroniza-
21. Which statement(s) is TRUE in explaining tion?
race condition problem? A. because there are race conditions
A. A situation whereby at least two B. because there is a process control
processes perform some operations on block

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.1 Overview 213

C. because there are preemptive and A. wait(), increment, signal(), decrement


non-preemptive conditions B. wait(), decrement, signal(), increment

PRACTICE BOOK» NOT FOR SALE


D. because there is a failed scheduling C. wakeup(), increment, block(), decre-
E. there is no right answer ment
D. block(), increment, wakeup(), decre-
26. Producer puts data in one slot while con-
ment
sumer retrieve data from another slot.
Producer and consumer need to be synchro- 30. When two or more processes are waiting
nized so that indefinitely for an event that can be caused
A. producer will not retrieve data after only by one of the waiting processes is
consumer puts the data into the buffer called
B. producer will not retrieve data before A. Mutex locks
consumer puts the data into the buffer B. Deadlocked
C. consumer will not retrieve data after C. Spinlocks
producer puts the data into the buffer D. None of the above
D. consumer will not retrieve data before
31. When high priority task is indirectly pre-
producer puts the data into the buffer
empted by medium priority task effec-
27. The readers-writers problem and its so- tively inverting the relative priority of the
lutions have been generalized to pro- two tasks, the scenario is called
vide reader-writer locks on some systems. A. priority inversion
When a process to modify the shared data B. priority removal
must request the lock in
C. priority exchange
A. Read MODE
D. priority modification
B. Write MODE
32. What are the two functions that control
C. Read and Write MODE
the critical section?
D. All of the above
A. wait() and stop()
28. When several processes access the same B. wait() and signal()
data concurrently and the outcome of the C. stop() and start()
execution depends on the particular order
in which the access takes place is called D. signal() and start()
a) dynamic conditionb) race conditionc) es- 33. What are the 4 types of locking mechanism
sential conditiond) critical condition to solve cs problem?
A. a A. software defined, hardware support,
B. b support from os, support from program-
ming language
C. c
B. software defined, resource support,
D. d support from hardware, support from pro-
29. Semaphore has two different operations; gramming language
to the value of semaphore by 1 C. software defined, resource support,
and to the value of semaphore by support from memory, support from pro-
1. gramming language

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.1 Overview 214

D. software defined, software support, B. software level


support from resource, support from pro-
C. both hardware and software level
gramming language
D. none of the mentioned
34. Semaphore can only have non negative val-
ues. At start, semaphore is always ini- 39. If a process is executing in its critical sec-
tialised to When semaphore is , this tion, then no other processes can be ex-
implies that ecuting in their critical section. What is
this condition called? a) mutual exclu-

NARAYAN CHANGDER
A. 0, 1, there is no process in cs
sionb) critical exclusionc) synchronous ex-
B. 1, 0, there is no process in cs clusiond) asynchronous exclusion
C. 1, 0, there is a process in cs
A. a
D. 0, 1, there is a process in cs
B. b
35. The readers-writers problem and its so- C. c
lutions have been generalized to pro-
vide reader-writer locks on some sys- D. d
tems. When a process wishes only to read
shared data, it requests the reader-writer 40. To enable a process to wait within the mon-
lock in itor

A. Read MODE A. a condition variable must be declared


as condition
B. Write MODE
B. condition variables must be used as
C. Read and Write MODE
boolean objects
D. All of the above
C. semaphore must be used
36. Requirements to prevent race conditions D. all of the mentioned
from occurring in the critical section are
A. Process deadlocks and starvation 41. Mutual exclusion can be provided by the
B. id Process, Compass, process state
A. mutex locks
C. Mutual Exclusions, Progress, Bounded
Waiting B. binary semaphores
D. there is no right answer C. both mutex locks and binary
semaphores
37. A classic solution to the critical-section
problem known as peterson solution. D. none of the mentioned
A. hardware based 42. The segment of code in which the process
B. software based may change common variables, update ta-
C. hardware and software based bles, write into files is known as:

D. none of the above A. program


B. critical section
38. Process synchronization can be done on
C. non-critical section
A. hardware level D. synchronizing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.1 Overview 215

43. Which one of the cs requirement that Pe- 48. Indefinite blocking or starvation is prob-
terson’s algorithm are met? lem related to

PRACTICE BOOK» NOT FOR SALE


A. mutual exclusion, bounded waiting A. Mutex locks
B. progress, bounded waiting B. Deadlocks
C. mutual exclusion, progress C. Spinlocks

D. mutual exclusion, progress, bounded D. None of the above


waiting 49. Each process must ask permission to enter
critical section in code; it then executes
44. We use the mutex lock to protect critical
in the ; once it finishes executing, it en-
regions and thus prevent race condition.
ters the code. The process then enters
The term mutex is short for
the code
A. Mutual exception
A. entry section, critical section, exit sec-
B. Mutual exclusion tion, remainder section
C. mutually expalined B. entry section, exit section, critical sec-
tion, remainder section
D. mutual excluded
C. critical section, entry section, exit sec-
45. The bounded buffer problem is also known tion, remainder section
as D. critical section, entry section, remain-
A. Producer-Consumer Problem der section, exit section
B. Reader-Writers problem 50. Name THREE(3) section of code in critical
C. Dining Philosophers problem section problem

D. Dining-Readers Problem A. empty section


B. entry section
46. Indefinite blocking may occur if we remove
C. exit section
processes from the list associated with a
semaphore in order. D. remainder section
A. LIFO (Last-in, First-Out) 51. A web server provides HTML files which
B. FIFO (First-in, First-Out) is received by the client web browser re-
questing the resource. Here, is the pro-
C. LIFO and FIFO ducer and is the consumer.
D. FILO (First in Last Out) A. HTML file, web server

47. which is not a limitation of Peterson Solu- B. web server, HTML files
tions, namely C. web browser, web server
A. Can be used on modern architecture D. web server, web browser
CPUs
52. In Spinlocks
B. Cannot be used on CPUs with modern
A. no context switch is required when a
architectures
process must wait on a clock
C. using only 2 processes
B. locks are expected to be held for short
D. there is no right answer time

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


5.2 The Critical-Section Problem 216

C. employed on multiprocessor system D. mutual exclusion, no preemption,


D. All of the mentioned progress

53. Which process can be affected by other 55. When two process executing and try-
processes executing in the system? a) co- ing to access the global variable, this
operating processb) child processc) parent is a
processd) init process A. simultaneously, same, race condition
A. a B. simultaneously, different, race condi-

NARAYAN CHANGDER
B. b tion

C. c C. concurrently, same, producer-


consumer problem
D. d
D. concurrently, different, producer-
54. In order to solve cs problem, an algorithm consumer problem
must satisfy the three essential criteria.
What are they? 56. A minimum of variable(s) is/are re-
quired to be shared between processes to
A. mutual exclusion, no preemption, solve the critical section problem.
bounded waiting
A. one
B. mutual exclusion, progress, hold and
wait B. two

C. mutual exclusion, progress, bounded C. three


waiting D. four

5.2 The Critical-Section Problem


1. Producer-Consumer problem is also known 15. Then 6 P (wait) operations and 4V
as: (signal) operations were completed on this
A. The bounded buffer problem semaphore. The resulting value of the
semaphore is
B. Mutual Exclusion
A. 9
C. Race Condition
B. 11
D. None of the mentioned
C. 13
2. A counting semaphore was initialized to D. 12

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


PRACTICE BOOK» NOT FOR SALE
6. CPU Scheduling

6.1 Basic Concepts


1. A small unit of CPU time (10-100). B. Long-term scheduler
A. Quantum time C. CPU scheduler
B. Time slice D. none of above
C. Millisecond 5. What is the mean value of waiting using
D. none of above the Prioty Scheduling method?
A. 7.5 seconds
2. Scheduling Algorithm Optimization Criteria
B. 8.25 seconds
A. Max CPU utilization
C. 8 seconds
B. Max throughput
D. 7.75 seconds
C. Min turnaround time
6. From the given problem, which algorithm
D. Min waiting time
takes the least time to allocate CPU usage
E. Min response time to the process?
3. What is the mean round robin (RR) wait A. SJF:Preemptive
time? B. Round Robin (RR)
A. 7.75 seconds C. SJF:Non-Preemptive
B. 8.25 seconds D. FCFS
C. 11 seconds 7. Gives control of the CPU to the process se-
D. 9.75 seconds lected by the short-term scheduler.
A. Dispatcher
4. Selects from among the processes in ready
queue, and allocates the CPU to one of B. CPU controller
them. C. Short-term CPU
A. Short-term scheduler D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.1 Basic Concepts 218

8. Out of the given problem, how many pro- 13. CPU scheduling decisions may take place
cesses are there in total? when a process:
A. 4 Process A. Switches from running to waiting state
B. 5 Process B. Switches from running to ready state
C. 3 Process C. Switches from running to terminated
D. 6 Process D. Switches from waiting to ready
E. Terminated

NARAYAN CHANGDER
9. Amount of time it takes from when a re-
quest was submitted until the first re-
14. Associate with each process the length of
sponse is produced, not output (for time-
its next CPU burst.
sharing environment)
A. First-Come, First-Served Scheduling
A. CPU Utilization
B. Shortest-Job-First Scheduling
B. Throughput
C. Shortest-Remaining-Time-First
C. Turnaround time
Scheduling
D. Waiting Time
D. Priority Scheduling
E. Response Time
E. Round Robin
10. What is the mean value of waiting using
15. What are the 5 scheduling criteria?
the preemptive SJF method?
A. CPU Utilization
A. 5.5 seconds
B. Throughput
B. 6.25 seconds
C. Turnaround time
C. 5 seconds
D. Waiting Time
D. 4.75 seconds
E. Response Time
11. A priority number (integer) is associated
with each process. 16. Each process gets a small unit of CPU
time, usually 10-100 milliseconds.After
A. First-Come, First-Served Scheduling
this time has elapsed, the process is pre-
B. Shortest-Job-First Scheduling empted and added to the end of the ready
C. Shortest-Remaining-Time-First queue.
Scheduling A. First-Come, First-Served Scheduling
D. Priority Scheduling B. Shortest-Job-First Scheduling
E. Round Robin C. Shortest-Remaining-Time-First
12. # of processes that complete their execu- Scheduling
tion per time unit. D. Priority Scheduling
A. CPU Utilization E. Round Robin
B. Throughput 17. What is the mean value of non-preemptive
C. Turnaround time SJF waiting?
D. Waiting Time A. 8 seconds
E. Response Time B. 7.25 seconds

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


6.2 Scheduling Algorithms 219

C. 9 seconds 20. Dispatcher includes:


D. 9.75 seconds A. switching context:saving and loading

PRACTICE BOOK» NOT FOR SALE


18. Amount of time a process has been waiting state
in the ready queue. B. switching to user mode
A. CPU Utilization C. Jumping to the proper location in the
B. Throughput user program
C. Turnaround time D. Jumping to the improper location in
D. Waiting Time the user program
E. Response Time
21. Short process behind long process (applies
19. from the question given What is the total to SJF, short process first)
time spent in running the process?
A. Convoy effect
A. 20 seconds
B. Convey effect
B. 23 seconds
C. 25 seconds C. Conveyor effect
D. 27 seconds D. none of above

6.2 Scheduling Algorithms


1. Suppose a disk has 201 cylinders, num- D. 4
bered from 0 to 200. At some time the
disk arm is at cylinder 100, and there is 2. Suppose requests have recently arrived
a queue of disk access requests for cylin- for data on cylinders 25, 46, 12, and 3, in
ders 30, 85, 90, 100, 105, 110, 135 and that order, and that the read-write head
145. If Shortest-Seek Time First (SSTF) is is currently at cylinder 20. If the disk
being used for scheduling the disk access, scheduling policy is SSTF, the outstanding
the request for cylinder 90 is serviced af- requests will be serviced in the order
ter servicing number of requests. A. 25, 46, 12, 3
A. 1 B. 25, 46, 3, 12
B. 2 C. 25, 12, 3, 46
C. 3 D. 12, 3, 25, 46.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7. Deadlocks

NARAYAN CHANGDER
7.1 System Model
1. Which of the following technique is used in by 3 processes A, B, C which have peak
Deadlock Recovery? time demands of 3, 4, 6 respectively. The
A. Process Termination minimum value of m that ensures deadlock
will never occur is
B. Resource Preemption
A. 11
C. Both
B. 12
D. None of the options
C. 13
2. Is defined by the number of available and D. 14
allocated resources, and the maximum de-
mands of the processes. 5. Each process utilizes a resource as follows:
A. No deadlocked state A. request
B. deadlocked state B. use
C. Resource-allocation state C. release
D. None of the above D. terminate

3. The system is said to be in unsafe state if 6. The purpose of Hold and Wait namely
A. A process is indefinitely postponed A. The situation prevents other pro-
cesses from having to wait
B. The system is deadlocked
B. Situation where a process is holding a
C. The operating system cannot guaran- resource exclusively and waiting to get an-
tee that all current processes can com- other resource
plete their work
C. A situation where there is mutual wait-
D. None of the above ing between several processes
4. Consider a system having m resources of D. Situation requesting service of an-
the same type. These resources are shared other device

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 System Model 221

7. Threads are divided based on their con- 12. If a system is in safe state
trollers ie A. Deadlock

PRACTICE BOOK» NOT FOR SALE


A. Singlethread, multithread B. No Deadlock
B. User thread, kernel thread C. Possibility of Deadlock
C. Singlecore, multicore D. none of above
D. User task, kernel task 13. What is the name of the technique in which
the operating system of a computer ex-
8. A total of 9 units of a resource type avail-
ecutes several programs concurrently by
able, and given the safe state shown be-
switching back and forth between them?
low, which of the following sequence will
be a safe state? Process Used Max A 2 7 A. Partitioning
B16C25D14 B. Multi-tasking
A. (P4, P1, P3, P2) C. Windowing
B. (P4, P2, P1, P3) D. Paging
C. (P4, P2, P3, P1) 14. In deadlock prevention, this impose a total
D. (P3, P1, P2, P4) ordering of all resource types, and require
that each process requests resources in an
9. There is more than one processor in one increasing order of enumeration.
system is the principle: A. Circular wait
A. Multithread B. Mutual exclusion
B. Multicore C. Hold and wait
C. Multisystem D. Mutual inclusion
D. Singlecore 15. If graph contains no cycle?
10. User-level thread dipetakan ke satu kernel A. Deadlock
thread merupakan model? B. No Deadlock
A. Many to many C. Possibility of Deadlock
B. One to one D. none of above
C. Two level 16. The incoming process in the scheduling
D. Many to one queue is on status
A. New
11. A system is in a safe state only if there
exists a a) safe allocationb) safe re- B. Ready
sourcec) safe sequenced) all of the men- C. Running
tioned D. Waiting
A. a
17. If graph contains a cycle and only one in-
B. b stance per resource type
C. c A. Deadlock
D. d B. No Deadlock

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 System Model 222

C. Possibility of Deadlock C. a process can request resources only


D. none of above when it has none
D. all of the mentioned
18. Processes that utilizes resources.
A. request 23. Which of the following condition is pre-
B. use vented by Deadlock prevention technique
to prevent the Deadlock?
C. release
A. Mutual Exclusion

NARAYAN CHANGDER
D. remove
B. Hold and Wait
E. idle
C. No Preemption
19. If graph contains a cycle and several in-
stances per resource type D. Circular Wait

A. Deadlock E. Any one of the four conditions


B. No Deadlock 24. Which of the following condition is re-
C. Possibility of Deadlock quired for deadlock to be possible?
D. none of above A. mutual exclusion
20. The distribution of each processor core is a B. a process may hold allocated re-
feature sources while awaiting assignment of
other resources
A. Data parallelism
C. no resource can be forcibly removed
B. Core parallelism
from a process holding it
C. Task parallelism
D. all of the mentioned
D. Thread parallelism
25. Which one of the following is a visual (
21. In deadlock avoidance, the simplest and
mathematical ) way to determine the dead-
most useful model requires that each pro-
lock occurrence?
cess declare the of resources of each
type that it may need. A. resource allocation graph
A. minimum number B. starvation graph
B. least number C. inversion graph
C. largest number D. none of the mentioned
D. maximum number
26. What is the purpose of CPU scheduling al-
22. To ensure that the hold and wait condition gorithms?
never occurs in the system, it must be en- A. Pick one of the ready processes to run
sured that next
A. whenever a resource is requested by
B. Put to sleep and wake up processes in
a process, it is not holding any other re-
an efficient manner
sources
B. each process must request and be al- C. Allocate memory to the processes in a
located all its resources before it begins fair and efficient way
its execution D. None of the other choices

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 System Model 223

27. What is correct approach with the “Mu- C. 12, 18, 9, 5


tual Exclusion condition” to prevent Dead- D. 9, 12, 18, 5
lock?

PRACTICE BOOK» NOT FOR SALE


A. Order resources numerically 32. What are the four conditions where dead-
lock can arise?
B. Take resource away
A. Mutual exclusion
C. Request all resources initially
B. Hold and wait
D. Spool everything
C. No preemption
28. Which of the following statements is a D. Circular wait
hardware solution to the critical region
problem? E. Singular wait

A. TSL 33. There is only one task that can be done in


B. Shared memory one process is the principle?

C. Semaphore A. Multithread

D. None of the other choices B. Singlecore


C. Multicore
29. If a deadlocked system, the processes can
D. Singlethread
A. do nothing
B. be awakened 34. Resources that the processes need to com-
plete its task.
C. release resources
A. Available
D. run
B. Max
30. Let S be the binary semaphore variable C. Allocation
and S=1 initially. Assume there are no
blocked processes in the system. If the fol- D. Need
lowing operations performed in the given 35. Same process may always be picked as vic-
order then how many blocked processes tim, include number of rollback in cost fac-
are present in the system at the end? 7V, tor.
5P, 14V, 10P, 21V, 15P
A. Selecting a victim
A. 0
B. Rollback
B. 14
C. Starvation
C. 20
D. None of the above
D. 12
36. A resource can be released only voluntar-
31. On a system using non-preemptive ily by the process holding it, after that pro-
scheduling, processes with expected run cess has completed its task.
times of 5, 18, 9 and 12 are in the ready
queue. In what order should they be run A. Mutual exclusion
to minimize wait time? B. Hold and wait
A. 5, 12, 9, 18 C. No preemption
B. 5, 9, 12, 18 D. Circular wait

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 System Model 224

37. All deadlocks involve conflicting needs for A. Deadlock


resources by B. Lockdead
A. One or more processes C. Deadblock
B. Two or more processes D. none of above
C. None of the above
43. What is the “sequential processes” con-
D. Three or more processes cept?

NARAYAN CHANGDER
38. This algorithm dynamically examines the A. There are both many CPU and many PC
resource-allocation state to ensure that B. All process is executed in concurrency
there can never be a circular-wait condi-
tion. C. No concurrency inside a process; ev-
erything happens sequentially
A. Deadlock-avoidance algorithm
D. None of the other choices
B. No deadlock-avoidance algorithm
44. The deadlock model consists of
C. Banker’s Algorithm
A. request, use, release
D. Resource-Allocation algorithm
B. new, request, use
39. Thread execution is done concurrently on:
C. request, run, use
A. Singlecore
D. request, use, exit
B. Singlethread
45. These are the currently allocated re-
C. Multicore
sources.
D. Singlesystem
A. Available
40. The running state has 3 possibilities ex- B. Max
cept
C. Allocation
A. Terminated
D. Need
B. Waiting
46. Suspend state occurs when
C. Ready
A. New process request
D. New
B. IO requests
41. The permanent blocking of a set of pro- C. PCB request
cesses that compete for system resources
is called D. PCB storage
A. Starvation 47. There exists a set {P0, P1, , Pn} of
B. Prioritization waiting processes such that P0 is waiting
for a resource that is held by P1, P1 is
C. All of the above waiting for a resource that is held by P2,
D. Deadlock , Pn-1 is waiting for a resource that
is held by Pn, and Pn is waiting for a re-
42. Is a situation where a set of processes are source that is held by P0.
blocked because each process is holding a
resource and waiting for another resource A. Mutual exclusion
acquired by some other process. B. Hold and wait

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 System Model 225

C. No preemption 53. What is starvation in Operating System?


D. Circular wait A. Process needs food

PRACTICE BOOK» NOT FOR SALE


48. Two types of edge in resource-allocation B. Process is waiting for resources for an
graph: indefinite time
A. request edge C. Resources are allocated to process
B. assignment edge D. none of above
C. allocation edge
54. What is the weakness of the Banker’s al-
D. receive edge gorithm?
49. A process said to be in state if it was A. Requiring that processes state their
waiting for an event that will never occur. maximum needs in advance
A. Safe B. Allowing the population of processes
B. Unsafe to vary over time
C. Starvation C. Enabling the number of resources to
fluctuate
D. Dead lock
D. Enabling processes to hold their re-
50. Mengembalikan resource dari child ke par- sources indefinitely
ent disebut
A. System call fork 55. Choose which one is correct
B. System call exit A. A child process can kill the parent pro-
cess
C. System call wait
D. System call parent B. Parent processes can kill child pro-
cesses
51. Suppose 2 processes P and Q are thereP- C. Child cannot duplicate parent
while(1){wait(mutex);printf(”1”);signal(mutex);}Qwhile(1){wait(mutex){printf(”0”);signal(mutex);}The
string generated by the 2 processes are D. Parent does not share resources with
child
A. 1*0*
B. (10)* 56. Each request requires that the system
C. (01)* consider the to decide whether the
current request can be satisfied or must
D. (1+0)* wait to avoid a future possible deadlock.a)
52. A system contains three programs and resources currently availableb) processes
each requires three tape units for its oper- that have previously been in the systemc)
ation. The minimum number of tape units resources currently allocated to each pro-
which the system must have such that cessd) future requests and releases of
deadlocks never arise is each process

A. 6 A. a
B. 7 B. b
C. 8 C. c
D. 9 D. d

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 System Model 226

57. Process instructs code that is executed au- C. An unsafe state is always a deadlock
tomatically state.
A. Sequence D. none of above
B. random
63. The circular wait condition can be pre-
C. Parallel vented by
D. Active A. defining a linear ordering of resource
58. In a directed graph used to model deadlock, types

NARAYAN CHANGDER
resources are represented using B. using thread
A. Eclipse C. using pipes
B. Rectangle D. all of the mentioned
C. Circular
64. Which of the following Algorithm in
D. Squares
Bankers Algorithm determine whether or
59. Which of the following is not a necessary not a request forwarded by a process for
condition for deadlock? acquiring a resource would lead the sys-
tem to an unsafe state?
A. Mutual Exclusion
B. Reentrancy A. Both Safety Algorithm, Resource re-
quest Algorithm
C. Hold and wait
B. Resource Request Algorithm
D. No pre-emption
C. Safety Algorithm
60. One thread waiting will not affect other
D. none of above
threads is a model overload?
A. Many to many 65. A computer system has 6 tape drives, with
B. Many to one ‘n’ processes competing for them. Each
process may need 3 tape drives. The max-
C. Two level imum value of ‘n’ for which the system is
D. One to one guaranteed to be deadlock free is
61. Algorithm requires an order of O(m x n2) A. 4
operations to detect whether the system B. 3
is in what state?
C. 2
A. No deadlocked state
D. 1
B. Deadlocked state
C. Resource-allocation state 66. A claim edge is represented by line and
D. None of the above request edge is represented by in Re-
source Allocation Graph.
62. Which of the following statement is incor- A. Dashed, Solid
rect?
B. Solid, Dashed
A. A safe state is not a deadlock state.
C. Dashed, Dashed
B. A deadlock state is always an unsafe
state. D. Solid, Solid

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 System Model 227

67. These are the most instances of resource 72. In a directed graph used to model deadlock,
type that the process can request. represents deadlock

PRACTICE BOOK» NOT FOR SALE


A. Available A. Any path
B. Max B. Dashed arrow
C. Allocation C. Solid arrow
D. Need D. Cycle
68. Given a priori information about the
73. A system is in the safe state if
number of resources of each type that
maybe requested for each process, it is A. the system can allocate resources to
possible to construct an algorithm that en- each process in some order and still avoid
sures that the system will never enter a deadlock
a deadlock state.a) minimumb) averagec) B. there exist a safe sequence
maximumd) approximate
C. all of the mentioned
A. a
D. none of the mentioned
B. b
C. c 74. Only one process at a time can use a re-
source
D. d
A. Circular wait
69. Which of the following process state tran-
sitions is correct, when the external event B. Mutual exclusion
for which a process was waiting hap- C. Hold and wait
pens? D. Mutual inclusion
A. Running → Blocked (waiting)
75. What is the characteristic of deadlocked
B. Running → ready
system
C. Blocked (waiting) → ready
A. Starvation
D. Ready → running
B. Circular wait
70. If in a resource-allocation graph, each
C. Aging
resource type has exactly one instance,
which of the following indicate a deadlock D. Saturation
situation?
76. A system has 12 magnetic tape drives and
A. The graph is connected 3 processes:P0, P1, and P2. Process P0
B. The graph has no cycle requires 10 tape drives, P1 requires 4
C. The graph has at least one cycle and P2 requires 9 tape drives.Process:P0
P1 P2 Maximum needs (process-wise:P0
D. The graph is not connected through P2 top to bottom):10 4 9Cur-
71. Minimize cost rently allocated (process-wise)5 2 2
A. Selecting a victim A. P0, P1, P2
B. Rollback B. P1, P2, P0
C. Starvation C. P2, P0, P1
D. None of the above D. P1, P0, P2

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 System Model 228

77. A process holding at least one resource 82. What are the data structures needed for
is waiting to acquire additional resources Banker’s algorithm?
held by other processes.
A. Available
A. Circular wait
B. Max
B. Mutual exclusion
C. Allocation
C. Hold and wait
D. Mutual inclusion D. Need

NARAYAN CHANGDER
78. How many percent of the CPU time is E. Processes
wasted, when a computer system has
enough room to hold two program and 83. If no cycle exists in the resource allocation
these programs are idle waiting for I/O graph
half the time? A. then the system will not be in a safe
A. 50% state
B. 25% B. then the system will be in a safe state
C. 75% C. all of the mentioned
D. None of the other choices
D. none of the mentioned
79. A possibility of deadlock can occur
84. A set of vertices V and a set of edges E.
A. If a system is in safe state
B. If a system is in instable state A. Resource-allocation graph
C. If a system is in unsafe state B. Wait-for graph
D. None of the above C. Process-allocation graph
80. Return to some safe state, restart process D. none of above
for that state
A. Selecting a victim 85. These are the instances of resource type
available.
B. Rollback
A. Available
C. Starvation
D. None of the above B. Max

81. Concurrent execution pada single core C. Allocation


yaitu D. Need
A. There are 2 threads executing at a
time 86. Race condition can be prevented by apply-
ing
B. There is 1 thread that is executed at a
time A. competition
C. There are 3 threads that execute 2 B. deadlock
times the time
C. request deadlock
D. There is 1 thread that is executed many
times the time D. deadlock prevention

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 System Model 229

87. If this algorithm is invoked arbitrarily, 92. System call fork works except
there may be many cycles in the resource A. Kill process
graph and so we would not be able to tell

PRACTICE BOOK» NOT FOR SALE


which of the many deadlocked processes B. Create process
“caused” the deadlock. C. Parent proses
A. Deadlock-avoidance algorithm D. Child proses
B. Detection algorithm 93. Consider a system with 3 processes that
C. Banker’s Algorithm share 4 instances of the same resource
type. Each process can request a maxi-
D. Resource-Allocation algorithm
mum of K instances. Resource instances
88. In avoidance Algorithm what is to be used can be requested and released only one at
for Single instance of a resource type? a time. The largest value of K that will
always avoid deadlock is
A. use a Deadlock-avoidance algorithm
A. 1
B. use a Detection algorithm
B. 2
C. use a Banker’s Algorithm
C. 3
D. use a resource-Allocation graph
D. 4
89. Which of the following conditions does not
94. The CPU is utilized by the inner thread
hold good for a solution to a critical section
problem? A. Memory and time
A. No assumptions may be made about B. Memory and cores
speeds or the number of CPUs. C. Time and process
B. No two processes may be simultane- D. Parallel dan concurrent
ously inside their critical sections.
95. What is not included in the status diagram
C. Processes running outside its critical is
section may block other processes.
A. Submit
D. Processes do not wait forever to enter
its critical section. B. New
C. Running
90. Processes running and accessing data at
the same time are called D. Terminated

A. Deadlock 96. Which of the following is NOT a valid dead-


lock prevention scheme?
B. Scheduling
A. Release all resources before request-
C. Concurrent
ing a new resource
D. Race condition
B. Number the resources uniquely and
91. Resource types include: never request a lower numbered resource
than the last one requested
A. CPU cycles
C. Never request a resource after releas-
B. Memory space ing any resource
C. I/O devices D. Request and all required resources be
D. Storage space allocated before execution.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.1 System Model 230

97. Deadlock avoidance is the simplest and A. a


most useful model that requires each pro-
B. b
cess declare the of resources of each
type that it may need. C. c
A. maximum number D. d
B. minimum number
102. Dijkstra’s Banker Algorithm require the
C. number
system to maintain the resource informa-

NARAYAN CHANGDER
D. none of above tion for each process, including
98. At a particular time of computation, the A. A count of the system’s total resources
value of a counting semaphore is 10. Then
12 P operations and “x” V operations B. The number of resources currently ac-
were performed on this semaphore. If the quired by the process
final value of semaphore is 7, x will be: C. The maximum resources that can be
A. 8 requested by the process
B. 9 D. Both b and c
C. 10
103. This converts to request edge when a pro-
D. 11 cess requests a resource.
99. A deadlock avoidance algorithm dynami- A. Request edge
cally examines the to ensure that a
circular wait condition can never exist.a) B. Allocate edge
resource allocation stateb) system storage C. Claim edge
statec) operating systemd) resources
D. Receive edge
A. a
B. b 104. In which of the following four necessary
C. c conditions for deadlock processes claim ex-
clusive control of the resources they re-
D. d
quire?
100. This is converted to an assignment edge A. no preemption
when the resource is allocated to the pro-
cess. B. mutual exclusion
A. Request edge C. circular wait
B. Allocate edge D. hold and wait
C. Claim edge
D. Receive edge 105. Which of the following is not a condition
necessary for deadlock to exist?
101. A state is safe, if a) the system does
A. Circular-wait condition
not crash due to deadlock occurrenceb) the
system can allocate resources to each pro- B. Preemption condition
cess in some order and still avoid a dead-
C. Mutual-exclusion condition
lockc) the state keeps the system pro-
tected and safed) all of the mentioned D. Hold and wait condition

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.2 Deadlock Prevention 231

106. In deadlock, if a system is in safe state sectionrelease (m[i]); release(m[(i+1)%5]);


then? This could cause:

PRACTICE BOOK» NOT FOR SALE


A. No deadlocks A. Thrashing
B. deadlocked B. Deadlock

C. Resource-allocation C. Starvation but not deadlock


D. None of the above
D. None of the above
109. Critical Region (Section) concept used in
107. In avoidance algorithm, w hat algorithm interprocess communication is:
must be use for multiple instances of a re-
source type? A. A part of the program where the
shared memory is accessed
A. Deadlock-avoidance algorithm
B. A part of shared data
B. No deadlock-avoidance algorithm
C. A part of shared memory
C. Banker’s Algorithm D. None of the other choices
D. Resource-Allocation algorithm
110. The status not ready to be executed is in
108. Let m[0] to m[4] be mutexes A. Running
(binary semaphores) and p[0] to B. Terminated
p[4] be processes. Suppose each
process pi executes the follow- C. New
ing:wait(m[i]);wait(m[(i+1)%5]);//critical D. Exit

7.2 Deadlock Prevention


1. Which of the following is not a strategy B. Deadlock Avoidance
for preventing deadlocks? C. Deadlock Approval
A. Deadlock Prevention D. Deadlock Detection and Recovery

7.3 Deadlock Avoidance


1. Resources that exist in a process should 2. which is deadlock prevention
not be taken for granted by other pro-
A. Lending in stages, and bankers ensure
cesses. To get these resources, they must
that funds are always available for other
be released first by the process holding
borrowers (safe state).
them, other than that the whole process
waits and allows only processes that have B. As soon as execution begins, each pro-
resources to run. cess requests resources as needed up to
a pre-stated maximum. Processes whose
A. non-preemption condition
stated resource requirements exceed the
B. mutual exclusion conditional) total system capacity cannot be executed.
C. hold and wait C. Each process must request all of the
D. circular wait condition required resources at once and not con-

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.3 Deadlock Avoidance 232

tinue until all are provided A. Mutual exclusion (mutual exclusion


D. Each borrower provides a maximum conditional
loan limit and timely mandatory repay- B. hold and wait
ments
C. Non-preemption condition
3. Conditions are like a chain, that is, a pro- D. (circular wait condition)
cess requires resources that are held by
the next process 7. which is a resource on deadlock

NARAYAN CHANGDER
A. non-preemption condition A. processor and disk
B. circular wait condition B. software and disk
C. hold and wait C. hardware and disks
D. mutual exclusion conditional D. subari dan Hannel O/O
4. cause of deadlock
8. deadlock repair and recovery
A. one process waits for a resource that
A. techniques for determining whether a
is being held by another process without
deadlock has occurred and identifying the
waiting for the resource held by that pro-
processes and resources involved in the
cess.
deadlock
B. one process is waiting for a resource
that is being held by another process that B. The usual period is to monitor re-
is waiting for a resource that is being held source requests and releases.
by that process. C. Temporarily retrieves resources from
C. process without waiting for a resource the processes that use them
that is being held by another process that D. When there is a deadlock in the sys-
is waiting for a resource held by that pro- tem, the deadlock must be resolved.
cess.
D. all answers are wrong 9. deadlock Linux
A. deadlock detection in the form of
5. Criteria for Selection of Processes to be BSOD(Blue Screen Of Death), recovery is
Eliminated in Deadlock except: a simple reboot
A. The most rarely use the processor B. running from sleep, the process that
B. The least results of the program i accesses the USB device will experience
C. The most resource consuming to date a deadlock

D. The one with the most total/maximum C. all wrong


resource allocation required D. all true
6. A process that is using resources can re- 10. cause of deadlock unless:
quest more resources, which means wait-
ing until the requested resource is not A. Mutual Exclusive
used by another process, this can cause B. Hold and wait
resource starvation because it is possible
C. No preemptions
that a process does not get resources for
a long time. D. Circular way

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


7.4 Deadlock Detection 233

11. Whether or not deadlock (detection) in a rotation result in a deadlock


graph can be seen from the rotation and
resources it has, except: C. Deadlock occurs due to lack of re-

PRACTICE BOOK» NOT FOR SALE


sources
A. If there is no rotation, it means there
is no deadlock. D. If there is a rotation, there is a poten-
B. Resources with a single instance and tial for a deadlock to occur

7.4 Deadlock Detection


1. What is the correct definition of dead- more resources
lock?
2. One of the following is not a method for
A. is a set of blocked processes each
handling deadlock
holding a resource and waiting to acquire
a resource held by another process in the A. never enter a deadlock
main memory
B. detect deadlock then recover
B. is a set of blocked processes one at
C. ignore
least is holding a resource and waiting to
acquire a resource held by another pro- D. solve daedlock efficiently
cess in the set
3. The directed edge from P to R means
C. is a set of blocked processes each
holding a resource and waiting to acquire A. P holds R
a resource held by another process in the
B. R requests P
set
C. P requests R
D. is a set of blocked processes each
holding a resource and doesn’t need any D. R holds P

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8. Main Memory

NARAYAN CHANGDER
8.1 Background
1. Primary Memory (RAM) is needed because B. Less throughput
(tick all correct) C. Page faults
A. It can directly (or randomly) address- D. Memory Fragmentation
able storage for the CPU
B. it is the memory for all programs and 4. Can the contents in ROM be changed?
data needed by the CPU A. Not normally but can be changed
C. Virtual Memory is much faster than Pri- through a process called ‘flashing’
mary Memory B. Yes
D. ROM is non-volatile C. The content are always changing as
E. Secondary storage is further away they are used by the CPU
from the CPU D. none of above

2. The operating system and the other pro- 5. dIf the RAM is low, the computer can use
cesses are protected from being modified extra memory from the
by an already running process because A. ROM
A. they are in different memory spaces B. CPU
B. every address generated by the CPU is C. CACHE
being checked against the relocation and
limit registers D. HARD DRIVE

C. they have a protection algorithm 6. Memory Fragmentation results in


D. they are in different logical addresses A. Stack overflow

3. Contiguous memory allocation faces the B. Better utilization of memory


problem of C. Poor utilization of memory
A. Less hit ratio D. Page faults

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Background 235

7. Which of the following is NOT considered A. External fragmentation


as part of a computer? B. Internal fragmentation

PRACTICE BOOK» NOT FOR SALE


A. Remote C. swapping
B. Webcam D. page faults
C. System Unit
13. What is the swap space in the disk used
D. Mouse for?
8. With , the absolute program (and data) A. Saving temporary html pages
is loaded into memory in order for execu- B. Saving process data
tion to start.
C. Storing device drivers
A. Dynamic Loading
D. Storing the super-block
B. static loading
C. Dynamic Linking 14. The first fit, best fit and worst fit are
strategies to select a
D. Static Linking
A. processor to run the next process
9. With relocation and limit registers, each B. free hole from a set of available holes
logical address must be the limit regis-
ter. C. process from a queue to put in mem-
ory
A. equal to
D. all of the mentioned
B. less than
C. greater than 15. Virtual memory is used
D. none of the mentioned A. when the RAM is not enough to contain
all of the programs and data currently be-
10. The swaps processes in and out of the ing used
memory. B. every other time a program is used
A. Memory manager C. as a secondary storage medium for
B. CPU long term storage of documents
C. CPU manage D. when the CPU is getting overheated
D. User 16. The MMU uses the memory allocation in-
11. The relocation register helps in formation stored in the table to compute
the corresponding
A. to protect the address spaces of pro-
cesses A. physical Address

B. a different address space to processes B. Effective Address

C. providing more address space to pro- C. Logical Address


cesses D. None of the Above
D. none of the mentioned 17. The CPU sends the which of the each data
12. The technique of memory compaction and or instruction used in the process to the
reuse of memory can be applied to over- MMU
come the problem of A. Logical Address

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Background 236

B. Physical Address 23. Which of the following is NOT a secondary


C. Effective Address storage device?

D. None of the above A. RAM


B. CD
18. The main storage of your computer
C. Floppy magnetic discs
A. RAM
D. ROM
B. Motherboard

NARAYAN CHANGDER
C. ROM 24. continguous memory allocation are divided
into
D. Hard Drive
A. paged memory management
19. when is used, the linker combines all
other modules needed by a program into B. single memory management
a single executable program to avoid any C. segmented memory management
runtime dependency.
D. partitioned memory management
A. Static Linking
B. Dynamic Loading 25. Parts of the computer that is tangible or
the physical components of the computer.
C. Static loading
A. Software
D. Dynamic Linking
B. Hardware
20. What does the RAM store?
C. Peopleware
A. Operating system, programs and data
D. Tupperware
which are currently being used
B. A program used to start the computer 26. Which transfer is faster
called the boot program or BIOS A. data between the cache and the CPU
C. All programs and documents stored on B. data between the RAM and cache
the computer
C. data between the RAM and CPU
D. none of above
D. data between the hard drive and CPU
21. Typical cache sizes range from about
A. 512 MB to 8 GB 27. Found in the computer’s BIOS, what actu-
ally is the ‘bootstrap’?
B. 2000 kB to 2000 GB
A. The program which takes the com-
C. 1 GB to 2 TB puter through steps that lead up to the
D. 512 KB to 8 MB loading of the operating system (OS)

22. The devices that are used to enter data B. The program responsible for loading
into the computer are known as the drives for peripheral devices like the
keyboard and mouse
A. Output devices
C. T he computer’s initial start-up pro-
B. Storage devices cess
C. Input devices D. The device used to attach the ROM to
D. none of above the computer’s motherboard

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.1 Background 237

28. Transient operating system code is code 33. dWhen the hard drive is used as extra
that RAM, this is known as
A. Virtual Reality

PRACTICE BOOK» NOT FOR SALE


A. stays in the memory always
B. is not easily accessible B. Virtual Memory
C. comes and goes as needed C. Extra Memory
D. never enters the memory space D. RAM

29. Memory allocation and deallocation can be 34. For which of the below allocation is man-
managed by aged by kernel and use of the allocated
memory is managed by run time library?
A. CPU
A. Caches
B. GPR
B. Disk
C. MMU
C. RAM
D. None of the above D. All of the above
30. When the processor fetches data from the 35. Increasing the RAM of a computer typically
RAM, it is first copied onto the improves performance because:
A. cache memory, and then from the A. Virtual memory increases
cache memory into the main processor
B. Larger RAMs are faster
B. RAM, and then from the RAM into the
C. Fewer page faults occur
main processor
D. Fewer segmentation faults occur
C. CPU, and then from the CPU into the
RAM 36. Which is the main circuit board of the com-
D. cache memory, and then from the puter?
cache memory into the RAM A. Processor
B. Motherboard
31. If M denotes the number of memory loca-
tions and N denotes the word size, then an C. Hard Disk
expression that denotes the storage capac- D. ROM
ity is
37. The devices are used to store data are
A. M*N know as the
B. M+N A. Input devices
C. 2M+N B. Output devices
D. 2M-N C. Storage devices
32. In contiguous memory allocation D. none of above

A. all processes are contained in a single 38. Cache memory acts as a buffer between
contiguous section of memory the processor and
B. the memory space is contiguous A. the RAM
C. each process is contained in a single B. the harddrive
contiguous section of memory C. the motherboard
D. none of the mentioned D. the user

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.2 Contiguous Memory Allocation 238

39. Virtual memory is C. It tracks whenever some memory gets


A. a memory management technique freed or unallocated and correspondingly
it updates the status.
B. a virus checking utility
D. All of the above
C. a piece of hardware
D. an series of pixels used to represent 43. In Process Address Space, The loader gen-
an image erates these addresses at the time when a
program is loaded into main memory is?
40. A 2GHz Processor can process:

NARAYAN CHANGDER
A. Symbolic addresses
A. 2, 000, 000 instructions per second
B. 2, 000, 000, 000 instructions per sec- B. Physical addresses
ond C. Relative addresses
C. 20, 000, 000 instructions per second D. None of the above
D. 200, 000 instructions per second
44. What is Dynamic loading?
41. A computer has 1024 megabytes of RAM.
That is the same as A. loading multiple routines dynamically

A. 1 Gb B. loading a routine only when it is called


B. 1000 Gb C. loading multiple routines randomly
C. 1 Kb D. none of the mentioned
D. 1 Tb
45. Virtual memory typically uses two storage
42. What is true about memory manage- devices, RAM and
ment? A. the hard drive
A. Memory management keeps track of
B. ROM
each and every memory location
C. a secondary piece of RAM
B. It decides which process will get mem-
ory at what time. D. a CD-ROM

8.2 Contiguous Memory Allocation


1. When the memory allocated to a process is a request but it is not contiguous
slightly larger than the process, then B. the total memory is insufficient to sat-
A. internal fragmentation occurs isfy a request
B. external fragmentation occurs C. a request cannot be satisfied even
C. both internal and external fragmenta- when the total memory is free
tion occurs D. none of the mentioned
D. neither internal nor external fragmen- 3. In internal fragmentation, memory is inter-
tation occurs nal to a partition and
2. External fragmentation exists when? A. is being used
A. enough total memory exists to satisfy B. is not being used

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 Segmentation 239

C. is always used C. the memory size


D. none of the mentioned D. all of the mentioned

PRACTICE BOOK» NOT FOR SALE


4. External fragmentation will not occur 6. A solution to the problem of external frag-
when? mentation is
A. first fit is used A. compaction

B. best fit is used B. larger memory space

C. worst fit is used C. smaller memory space


D. none of the mentioned
D. no matter which algorithm is used, it
will always occur 7. is generally faster than and
5. In fixed size partition, the degree of mul- A. first fit, best fit, worst fit
tiprogramming is bounded by B. best fit, first fit, worst fit
A. the number of partitions C. worst fit, best fit, first fit
B. the CPU utilization D. none of the mentioned

8.3 Segmentation
1. As you open or run something the OS allo- 4. The segment limit contains the
cates to it.
A. starting logical address of the process
A. The Kernel
B. starting physical address of the seg-
B. Memory ment in memory
C. Storage C. segment length
D. Disk Space D. none of above
2. If memory runs out, then 5. The address of a page table in memory is
A. The computer will continue as normal pointed by
B. The computer decreases in processing A. page register
speed
B. page table base register
C. The computer will not handle any more
C. stack pointer
applications being run
D. The computer will start new processes D. program counter

3. The segment descriptor register is used to 6. What does contiguous mean?


store A. Data is split into random allocations
A. attributes B. Data is stored randomly another
B. limit address of segments C. Data is illogically stored onto memory
C. base address of segments D. Data is logically stored one after an-
D. all of the above other

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 Segmentation 240

7. The segmentation unit allows 13. Your RAM is controlled and allocated by
A. maximum size of 4GB segments the

B. use of segment address components A. CPU

C. use of offset address components B. ROM

D. all of the answer C. Operating System


D. Registers
8. Paging can

NARAYAN CHANGDER
A. Store items not currently in use into 14. eliminate internal fragmentation but,
secondary storage as VM like dynamic partitioning, it suffers from
external fragmentation.
B. Split programs into the same size
across memory A. Segmentation

C. Moves the data around B. Paging

D. Allows data to be contiguously stored C. Organizing


D. Partitioning
9. Page table stores the mapping between
A. pages and frames 15. Pages not currently in use can be stored on

B. process and PCB


A. RAM
C. frame and PCB
B. SSD/HDD
D. page and PCB
C. Virtual memory
10. Virtual memory is necessary when D. ROM
A. RAM is full
16. Disk thrashing is when
B. ROM is full
A. The memory controller spends too
C. SSD is full much time swapping between RAM and
D. HDD is full ROM
B. The memory controller spends too
11. The concept of virtual memory is based on
much time swapping between memory
one or both of two basic techniques, which
and virtual memory
are
C. The memory controller spends too
A. segmentation and paging
much time swapping between the SSD and
B. overlaying and relocation virtual memory
C. segmentation and partitioning D. The memory controller spends too
D. none of the above much time swapping between memory
and RAM
12. Pages have
17. Paging
A. fixed and equal size
A. Splits programs into different sizes
B. fixed and unequal size across memory
C. variable and equal size B. Splits programs into the same size
D. variable and unqual size across memory

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.3 Segmentation 241

C. Moves the data around 23. What is not true about advantage of logi-
D. Allows data to be non-contiguously cal?

PRACTICE BOOK» NOT FOR SALE


stored A. Easy to relocate segment than entire
address space
18. What is segmentation translates into
when paging is enabled? B. Less overhead

A. logical address to physical address C. No external fragmentation


B. linear address to physical address D. No internal fragmentation
C. logical address to linear address 24. There are two types of optimisation tech-
D. logical address to absolute address niques used by a OS, they are
A. Paging
19. Segment descriptors are created by
B. Planning
A. compilers
B. operating system but not by applica- C. Segmentation
tion programs D. Segregation
C. linkers and loaders
25. The phenomenon, in which there is wasted
D. all of the answer space internal to a partition due to the fact
that the block of a data loaded is smaller
20. If there are 32 segments, each of size 1Kb, than the partition, is referred to as
then the logical address should have:
A. internal fragmentation
A. 13 bits
B. simple fragmentation
B. 14 bits
C. external fragmentation
C. 15 bits
D. dynamic fragmentation
D. 16 bits

21. Which of the following statement is true? 26. Segmentation

A. paging is compulsory and segmenta- A. Does not store items not currently in
tion is optional use into secondary storage

B. both segmentation and paging are op- B. Splits programs into different sizes
tional across memory

C. both segmentation and paging are C. Moves the data around


compulsory D. Allows data to be contiguously stored
D. segmentation is compulsory and pag-
ing is optional 27. There are two types of memory manage-
ment techniques used by a OS, they are
22. You can manage memory by using
A. Task manager A. Paging
B. The bootstrap B. Planning
C. The OS C. Segmentation
D. The VRAM D. Segregation

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 Paging 242

28. Memory that uses secondary storage so B. frames


that it seems like an entire program is run-
C. page table
ning from RAM
A. Cache Memory D. none of above
B. Virtual Memory
30. Virtual Memory is used to RAM
C. Flash Memory
A. Impede
D. Registers

NARAYAN CHANGDER
B. Supplement
29. In paging physical memory is divided into
partitions called C. Adhere to
A. pages D. Open

8.4 Paging
1. Associative memory working under 5. When did Auggie’s parents take a tour of
A. Serial Search the school?
B. Seqential search A. Last month
C. Parellel Search B. Last year
D. Sorted search C. Last week
D. none of above
2. with demand paging a page of a process is
brought into the main memory 6. Which algorithm suffers from Belady’s
A. when the execution of a process starts anomaly?
B. when the process comes to the ready A. FIFO
queue B. Optimal
C. when the page is required during exe- C. LRU
cution
D. All of these
D. never bring a page to main memory
7. Sound information is sent to all audio out-
3. An inverted page table has for each puts (speakers) and cannot be random.
real page (or frame) of memory. This is Paging System Type audio
A. Two entry A. parallel
B. one entry B. serial
C. both C. multi
D. None D. standard
4. For every process there is a E. high class
A. page table 8. What is the definition of a paging service?
B. copy of page table A. To send or contact someone through a
C. pointer to page table public announcement or by using a pager
D. all B. Proficiency in using the paging tool

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 Paging 243

C. Knowledge of paging service 14. In hashed page tables, the virtual page
D. Ability to convey information number in the is hashed into the hash
table

PRACTICE BOOK» NOT FOR SALE


9. Paging increases the time. A. virtual address
A. waiting B. Physical address
B. execution C. Logical address
C. context-switch D. None
D. all 15. What distinguishes the Multy Audio Pag-
ing System from other types is that it is
10. “Our call is addressed to (Mr. Ridwan)
equipped with
from (Majalengka) at this time waiting
for your arrival at the (main lobby on the A. teacher amp
ground floor) immediately” Based on the B. desk microphone
paging text above, which word needs em- C. indoor class speakers
phasis when paging?
D. class speakers
A. Name, address and place
E. master amplifier
B. Address, place and color
16. What kind of animal did Auggie’s school
C. Place, number plate and name
have in the science lab?
D. Place, color and name A. Rabbit
11. The least frequently used page replace- B. Hen
ment algorithm will select the page that C. Chick
A. has been used for the longest time in D. none of above
the past.
17. Logical memory is broken into blocks of the
B. has been used most number of times. same size called
C. will not be used for the longest time in A. frames
future.
B. pages
D. has been used least number of times.
C. backing store
12. Virtual Memory can be implemented via D. none
A. Paging 18. What did the school smell like?
B. Segmentation A. A locker room
C. Segmentation with paging B. A pizza shop
D. demand paging C. A hospital
13. The page table of the process is held in the D. none of above
space 19. The size of a page is typically
A. Logical address A. varied
B. physical address B. power of 2
C. kernel C. power of 4
D. None D. none

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 Paging 244

20. In inverted page table, the number of en- 25. In a room where 6 ceiling speakers are in-
tries is equal to the number of in the stalled, each power is 6 watts, then the
main memory amplifier power needed is
A. frames A. 12 watt
B. pages B. 24 watt
C. memory elements C. 36 watt

D. none D. 48 watt

NARAYAN CHANGDER
E. 60 watt
21. What is Auggie’s favorite class?
26. Access problem of Page table is solved by
A. Gym
A. Processor
B. English
B. RAM
C. Science
C. TLB
D. none of above
D. Segmentation
22. A speaker is given an input power of 3 27. Here are the tools/components used in au-
watts, the speaker has an SPL specifica- dio paging as an impedance adapter so
tion of 90 dB. (Log 3 = 0.48). Then how that the voltage and power received by all
big is the SPL speakers are the same and not affected by
A. 90 dB long distances/cables.
B. 90, 3 dB A. switch
C. 90, 48 dB B. attenuator

D. Dulcet C. transformer OT

E. 89, 52 dB D. speaker
E. cable
23. Types of PAGING in Operating System
28. Page table is stored in
A. Demand paging.
A. HDD
B. Loader Paging.
B. SSD
C. Both
C. RAM
D. none
D. Processor
24. What is our attitude when we realize 29. In a optimal page replacement algorithm,
there is an error reading the text when do- when a page is to be replaced, which of
ing paging? the following pages is chosen?
A. Stop and repeat the correct text A. oldest
B. Laugh and repeat back the correct text B. newest
C. Continue even knowing there is a text C. Frequently occurred page in the future
error
D. Not Frequently occurred page in the fu-
D. Stop and tell others to do the paging ture

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 Paging 245

30. A common approach for handling address 35. What kind of lie did Auggie’s mom tell him
spaces larger than 32 bits is to use a about the test?

PRACTICE BOOK» NOT FOR SALE


A. hashed page table A. White
B. Demand Page table B. Real
C. Virtual table C. Big
D. None D. none of above

36. has the lowest fault rate of all the


31. The table contains the base address of
page replacement algorithms.
each page in physical memory.
A. LRU
A. process
B. FIFO
B. memory
C. Optimal
C. page
D. Counting based
D. frame
37. The operating system maintains a ta-
32. The valid/ invalid bit in the page table is ble that keeps track of how many frames
set if have been allocated, how many are there,
A. the page is present in the main mem- and how many are available.
ory A. page
B. the page is not present in the main B. mapping
memory C. frame
C. page is not required D. memory
D. page is required
38. Page size 1024 bytes and process size is
33. Speakers with an SPL of 85 dB, when mea- 72766 bytes, internal fragmentation is
sured within 2 meters the SPL is A. 962
A. 91 dB B. 62
B. 87 dB C. 72704
C. 80 dB D. 71
D. 79 dB 39. What is the name of Auggie’s School?
E. 85, 2 dB A. Breecher Prep

34. Multilevel Paging is a paging scheme B. LVM


which consist of two or more levels of C. Polk
page tables in a hierarchical manner. It is D. Beecher Prep
also known as paging
40. Auggie’s dad described sending him to mid-
A. page table
dle school was like sending a a to the
B. Inverted slaughter
C. Hierarchical A. turtle
D. None B. sheep

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


8.4 Paging 246

C. lamb B. Chest breathing


D. none of above C. Shoulder breathing
41. With paging there is no fragmentation. D. Normal breathing
A. internal 47. Where did Auggie’s parents meet?
B. external
A. Elementary School
C. either type of
B. College

NARAYAN CHANGDER
D. none
C. High School
42. plays an important role in implement- D. none of above
ing virtual memory.
A. Paging 48. a logical address is as follows:
B. Virtual memory A. page no
C. Demand memory B. Page offset
D. none C. both
43. In a hashed page table, with the hash D. none
value being the
49. The is used as an index into the page
A. virtual page number table.
B. Page number
A. frame bit
C. Both
B. page number
D. None
C. page offset
44. A page fault occurs D. frame offset
A. when the process enters the ready
state 50. Operating system supports different page
replacement algorithms. From the given
B. when the process enters the blocked
below option which is not a valid one?
state
C. when the page is in the memory A. Optimal

D. when the page is not in the memory B. Currently used


C. LRU
45. Physical memory is broken into fixed-
sized blocks called D. FIFO
A. frames 51. Replace the page that is not used for the
B. pages longest period of time. This principle is
C. backing store adopted by

D. none A. LRU
B. FIFO
46. The breathing technique used to perform
paging is C. MFU
A. Diaphragmatic breathing D. LFU

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


PRACTICE BOOK» NOT FOR SALE
9. Virtual Memory

9.1 Background
1. What does the bootstrap loader do? B. Reducing the number of users that can
A. Loads files from the hard drive into be served
RAM C. Reducing Response
B. Loads the operating system from the D. Reduced I/O processing
hard drive into RAM
5. It is the average time taken to access a
C. Loads my shoelaces from the hard byte or word from our computer.
drive into RAM
A. Average Memory Access Time
D. none of above
B. RAM Access Time
2. The set of addresses (parts of process) C. Hard disk Access Time
which are inside the RAM is called
D. Mode Memory Access Time
A. Principle of Locality
6. Which of the following are the advantages
B. Virtual Memory
of virtual memory? (Select two.)
C. Virtual Address Space
A. Degree of multiprogramming is higher.
D. Translation Lookaside Buffer
B. Decrease the average memory access
3. Which one is secondary storage? time.
A. RAM C. Decrease the effective memory ac-
cess time.
B. Hard Disk
D. Execute even processes whose larger
C. ROM than the size of RAM.
D. BIOS
7. Why is Virtual Memory needed or used by
4. Mention one advantage of virtual mem- a computer?
ory? A. When RAM becomes full because of
A. Space becomes smaller too many programs running at once

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.1 Background 248

B. When ROM is too small and struggles 12. Where are the BIOS instructions stored
to store the Operating System A. In a RAM stick
C. When users wish to store data on an B. In a chip on the motherboard
external server such as ‘the cloud’
C. In the hard drive
D. When chosen by the user or computer
administrator D. none of above

13. When would a PC need to use virtual mem-


8. With the help of Virtual Memory

NARAYAN CHANGDER
ory
A. Hard disk size will be increased A. When you want to save to the cloud
B. Cache memory size will be increased B. When the hard drive is full
C. Increase the logical address space C. When RAM is full
D. Increase RAM size D. When ROM is full

9. What can you expect to find in RAM? 14. The form of implementing page replace-
ment on the counter and stack algorithm,
A. Programs currently in use
namely?
B. Closed programs
A. RUL
C. The CPU B. LRU
D. The Hard Drive C. LUR
10. In Windows Work processes there is a min- D. URL
imum set and a maximum set what it is
15. Virtual memory typically uses two storage
used for.
devices, RAM and
A. minimum set is the minimum number
A. the hard drive
of pages a process has in memory
B. ROM
B. minimum set is the maximum number
of pages a process has in memory C. a secondary piece of RAM

C. Processes can be assigned fewer D. a CD-ROM


pages until their work set is Maximum
16. Virtual Memory is used in
D. Process can be defined as many pages A. Single Programming
up to its working set is Maximum
B. Duo Programming
11. Why does using virtual memory slow your C. Multiprogramming
PC down?
D. All wrong
A. It uses up too much ROM
17. Where is virtual memory?
B. It fills up the cache
A. In the CPU
C. Swapping things in and out of virtual
memory is slow B. In the cloud

D. Because getting things from the cloud C. In the hard drive


is slow D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.1 Background 249

18. Virtual Memory 24. Virtual memory can be done with


A. located in RAM A. Demand paging

PRACTICE BOOK» NOT FOR SALE


B. located in the CPU B. Single paging
C. located in the hard drive C. Multitasking
D. located in the cloud D. Multi paging
19. Which would normally have the lowest 25. Which statement is true? (1-3)
amount of space?
A. ROM is non volatile
A. Traditional magnetic hard disk
B. RAM has a slow access time relative to
B. An SSD (solid state drive)
other storage devices
C. RAM
C. RAM holds the BIOS
D. ROM
D. RAM can be Static (SRAM) or Dynamic
20. In the LRU (Least Recently Used) Algo- (DRAM)
rithm, the page that is replaced is the most
26. Page grant requests using
A. Often used for A. Copy
B. Long unused B. Drawing
C. Not used at all C. Swapping
D. All wrong D. Cut

21. Using virtual memory is not as efficient as 27. What is the most durable?
using RAM, why?
A. Magnetic Tape
A. it slows down the processing of the
B. Solid State Drive
computer system
C. Hard Drive
B. it takes up storage space on your USB
C. it is expensive D. CD

D. none of above 28. What is a disadvantage of using cache


memory?
22. Where does virtual memory live?
A. its very expensive
A. RAM
B. it speeds up the processing
B. Cache
C. Hard Disk C. it is too big

D. ROM D. none of above

23. It is a type of cache where few pages of 29. What type of memory is accessed the
the pagetable are being maintain. quickest?
A. Translation Lookaside Buffer A. Solid State Memory
B. Random Access Memory B. Magnetic Storage
C. Hard disk C. Blu-Ray
D. Register D. CD/DVD

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.1 Background 250

30. Why do computers use binary to read data 35. The frame-allocation algorithm serves to
from memory? determine
A. It’s all they understand A. lowest error rate
B. It’s quicker B. How many frames will each process
C. Computers are made up of electronic give
switches C. result number of frames
D. Computers only read 1’s and 0’s be- D. Which frame to replace

NARAYAN CHANGDER
cause it’s all they can do
36. You can write data more than once to this
31. The LRU (Least Recently Used) Algorithm
device
is a combination of the
A. TCP/IP
A. FIFO algorithm and maximal algorithm
B. RAM
B. FIFO algorithm and maximal algorithm
C. FOFI algorithm and optimal algorithm C. ROM

D. FIFO algorithm and optimal algorithm D. Address Bus

32. The purpose of Slab allocation 37. What is virtual memory?


A. allocate (project) the kernel needed in A. This is when part of the hard drive is
physical memory to run a particular pro- used as an extension to RAM
cess B. This is when the hard drive is used as
B. allocates the kernel (memory) needed an extension to ROM.
in physical memory to run a particular pro-
C. This is responsible for starting up the
cess
computer
C. allocate (object) the kernel needed in
D. The virtual memory is one of the CPU’s
physical memory to run a particular pro-
registers
cess
D. none of above 38. Which statement is true?

33. It says that at anytime a process will re- A. RAM is part of the hard disk
quire only few pages in the memory. B. ROM is volatile
A. Principle of Locality C. RAM stores programs / data used by
B. Virtual Memory the CPU
C. Virtual Address Space D. ROM contains the operating system
D. Translation Lookaside Buffer 39. Access to files is done with pointers, not di-
34. There are 2 major allocation schemes rectly with system calls read() and write()
namely which is one of the advantages of?
A. Local Allocation A. Copy-on-Write
B. Global Allocation B. Memory-Mapped File
C. Arround Allocation C. Thrashing
D. Area Allocation D. Page Replacement

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.1 Background 251

40. This is volatile storage 45. what type of storage is rom? (2 answers)
A. ROM A. secondary

PRACTICE BOOK» NOT FOR SALE


B. RAM B. volatile

C. Secondary Storage C. primary


D. non volatile
D. Hard Disk
46. How to simplify and speed up file access
41. A computer is using Virtual Memory. using calls
Why?
A. open(), read()
A. There is not enough RAM
B. open(), read(), write()
B. The cache is too slow
C. opened(), read(), write()
C. The virtual memory is too small D. none of above
D. The hard disk is too slow
47. When is virtual memory used?
42. What does RAM stand for? A. Running memory intensive program
A. Random Access Memory B. Computer has run out of RAM to store
what it needs
B. Random Area Machine
C. Both of the other options
C. Real Access Machine
D. none of above
D. Rapid Access Memory
48. Where is BIOS (Boot-up program)?
43. If page containing the byte w/c the CPU A. ROM
wants to access is not present inside the
RAM, it is B. RAM

A. Page fault C. Cache


D. Hard Disk
B. Page hit
C. Page drop 49. This memory stores the data of the oper-
ating system and programs that are cur-
D. page gain rently running, for access by the CPU.
44. Which of the following statements are cor- A. RAM
rect? (choose as many as you think are B. ROM
appropriate) C. Cache memory
A. DRAM is cheaper and slower than D. Flash memory
SRAM
50. There are several Page Replacement Algo-
B. DRAM is more expensive and faster
rithms, including
than SRAM
A. Maximum algorithm
C. SRAM is more expensive and faster
than DRAM B. Mixed algorithm

D. SRAM is slower and less expensive C. Minimal algorithm


than DRAM D. Optimum algorithm

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.2 Page Replacement 252

51. A small piece of memory, located inside 55. Where would virtual memory normally
the CPU is called the be?
A. virtual memory A. RAM
B. ROM B. Hard drive
C. cache C. Cache
D. none of above D. The cloud
52. Virtual is a technique of separating 2 mem-

NARAYAN CHANGDER
56. Copy-on-Write itself functions for
ories viz
A. Logic memory and user memory A. Page invite

B. Logic memory and internal memory B. Page joined


C. Internal memory and user memory C. Page Sharing
D. none of above D. none of above

53. One of the most commonly used imple- 57. What are the advantages of On Demand
mentations of virtual memory and hard- Paging Method
ware assistance to know the location of
A. Little Memory, Little IO, Concurrent
the page when needed is?
A. SIngle Paging B. Less Memory, Less I/O, Paging

B. Multi Paging C. Little Memory, cold CPU, Concurrent


C. Demand segmentation D. none of above
D. Demand paging 58. This contains the BIOS (Boot-up program)
54. what type of memory is ram? (3-4)

A. volatile, temporary A. ROM


B. non volatile, permanent B. Secondary Storage
C. non volatile, temporary C. Hard Disk
D. volatile, permanent D. RAM

9.2 Page Replacement


1. Consider the following sequence of page 2. When a page is selected for replacement,
references:1 2 3 4 4 2 1 4 1 3 4Deter- and its modify bit is set
mine how many page faults will occur for A. the page is clean
the “Optimal” algorithms, assuming there
are only “2 frames”. B. the page has been modified since it
was read in from the disk
A. 10 page faults
C. the page is dirty
B. 8 page faults D. the page has been modified since it
C. 6 page faults was read in from the disk & page is dirty

D. 4 page faults 3. Future study is done is which algorithm?

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.2 Page Replacement 253

A. FIFO 9. Which of the following page replace-


B. LRU ment algorithms suffer from “Belady’s
anomaly?

PRACTICE BOOK» NOT FOR SALE


C. Optimal
A. Second Chance
D. None of these
B. FIFO
4. Page fault is
C. LRU
A. Page is present in memory
B. Page is not present in memory D. Optimal
C. None of the above
10. The Queue represent which page replace-
D. none of above ment algorithm?
5. A FIFO replacement algorithm associates A. FIFO
with each page the
B. LRU
A. time it was brought into memory
C. Optimal
B. page after and before it
C. size of the page in memory D. None of these

D. All of the above answers 11. Which one is a Character User Interface
6. Consider the following sequence of page (CUI) Operating System
references:7 0 1 2 0 3 0 4 2 3 0Deter- A. DOS
mine how many page faults will occur for
the “FIFO” algorithms, assuming there are B. Fedora
only “3 frames”. C. Unix
A. 12 page faults
D. Oracle
B. 10 page faults
C. 8 page faults 12. Users that their processes are running
D. 6 page faults on a paged system.
A. are aware
7. occurs when a process spends more
time paging than executing. B. are not aware
A. Thrashing C. maybe aware
B. b. Memory-mapping
D. None of the above answers
C. c. Demand paging
D. none of above 13. Which algorithm requires future knowl-
edge of reference strings
8. What is the Full form of FIFO
A. FIFO
A. Fast Input Fast Output
B. First In First Out B. Least recently used

C. First Input First Output C. optimal Algorithm


D. Fast In Fast Out D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.2 Page Replacement 254

14. What is the Optimal page-replacement al- 19. Which one is not an Operating System
gorithm? A. DOS
A. Replace the page that has not been B. Fedora
used for a long time
C. Unix
B. Replace the page that has been used
for a long time D. Oracle

C. Replace the page that will not be used 20. Reference bit is used for

NARAYAN CHANGDER
for a long time A. Implementing LRU page replacement
D. None of the above answers algorithm

15. Which Page replacement algorithm suffer B. Implementing NRU algorithm


from beladys anamoly C. To check the page table entry in the
cache memory
A. FIFO
D. None of the above
B. LRU
C. Optimal 21. Which of the algorithms requires future
knowledge of the reference string?
D. none of above
A. FIFO
16. The Head and the Tail concept represent
B. Random
which page replacement algorithm?
C. LRU
A. FIFO
D. Optimal
B. LRU
C. Optimal 22. Least Recently Used (LRU) Algorithm
D. None of these A. is the page-replacement algorithm
most often implemented
17. Consider the following sequence of page
B. Replace page that will not be used for
references:1 2 3 4 4 2 1 4 1 3 4Deter-
longest period of time
mine how many page faults will occur for
the “FIFO” algorithms, assuming there are C. can suffer from Belady’s anomaly
only “2 frames”. D. Replace page that has not been used
A. 9 page faults in the most amount of time
B. 7 page faults 23. If no frames are free, how many page
C. 5 page faults transfer(s) is/are required/
D. 3 page faults A. one
B. two
18. Optimal page-replacement algorithm is dif-
ficult to implement, because C. three
A. it requires a lot of information D. four
B. it requires future knowledge of the ref- 24. Optimal page replacement algorithm is
erence string also called as
C. it is too complex A. LIFO
D. it is extremely expensive B. NRU

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


9.2 Page Replacement 255

C. Clairvoyant replacement algorithm C. 8 page faults


D. Page buffering D. 7 page faults

PRACTICE BOOK» NOT FOR SALE


25. The aim of creating page replacement algo- 29. Aim of creating page replacement algo-
rithms is to rithm is
A. replace pages faster A. To increase page fault
B. increase the page fault rate B. To decrease page fault
C. decrease the page fault rate C. To allocate multiple frames
D. to allocate multiple pages to pro- D. none of above
cesses
30. Which one is the slowest Algorithm?
26. Which one is the moderate algorithm?
A. FIFO
A. FIFO
B. Optimal B. LRU

C. LRU C. Optimal

D. None of these D. None of these

27. LRU page-replacement algorithm asso- 31. Which Algorithm is the fastest algorithm?
ciates with each page the A. LRU
A. time it was brought into memory B. FIFO
B. the time of that page’s last use C. Optimal
C. page after and before it D. None of these
D. all of the mentioned
32. What are the two methods of the LRU
28. A process refers to 5 pages, A, B, C, D, E in page replacement policy that can be imple-
the order:A B C D A B E A B C D EIf the page mented in hardware?
replacement algorithm is FIFO, the number
A. Counters
of page transfers with an empty internal
store of 3 frames is? B. RAM & Registers
A. 10 page faults C. Stack & Counters
B. 9 page faults D. Registers

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10. Mass-Storage Structure

NARAYAN CHANGDER
10.1 Overview of Mass-Storage Structure
1. If the counter value on the swap map is 0, A. SSD
then B. Platter
A. Page slots are filled by other pro- C. Diskette
cesses
D. Disk
B. Page slots available
E. Head
C. The slot is in the ready queue
D. All true 5. The time required by the arm to move to
the cylinder is called
2. The following is an example of a magnetic A. Average Access Time
disc.
B. Average Seek Time
A. SSD
C. Average Latency
B. Hard drive
D. Transfer Rate
C. Floppydisk
6. In Constant Linear Velocity (CLV) when the
D. Head
track position is farther from the center of
E. Magnetic Disk the disc then?
3. What disk algorithm is called the Elevator A. the fewer sectors there are
algorithm? B. there is no change in the sector
A. FCFS C. the more sectors there are
B. SSTF D. all true
C. C-SCAN 7. Below is an example of host attached stor-
D. SCAN age except

4. A circular disc made of metal/plastic A. SATA


coated with a magnetic material is B. SCSI

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Overview of Mass-Storage Structure 257

C. ATA C. RAID 6
D. RAID D. RAID 1

PRACTICE BOOK» NOT FOR SALE


8. Below which is not a type of SSD is
13. Derived from damage to the storage
A. SSD SATA 2.5 Inch
media
B. SSD M.2 SATA
A. Hard Bad Block
C. SSD M.3 SATA
D. Sad mosquito B. Logical Bad Block
C. Partitioning
9. Below which is a small device that can read
and write from the disk is D. Boot Block
A. Head
B. CPU 14. On a magnetic disk, the disk can rotate
from
C. Platter
D. Track A. 40-230 times per second

E. Diskette B. 50-240 times per second

10. Below are not the limitations of magnetic C. 60-250 times per second
tape D. 70-260 times per second
A. I/O access is very slow
E. 80-270 times per second
B. Less environmentally friendly
C. Requires machine interpretation 15. The time needed to find the sector where
D. High data transfer speed the data is stored is the meaning of
E. The process must be sequential A. Average Latency
11. (1) Each track on a different cylinder has B. Average Access Time
a different diameter (2) The outer, the
larger the diameter (3) The data rate is C. Average Seek Time
made uniform by the Constant Linear Ve- D. Average Time
locity method. The characteristics above
are from the understanding E. Average Transfer Time
A. Disk Structure
16. A technology in data storage that is used
B. Non-Uniform Sector/Track to minimize errors when storing and read-
C. Host Attached Storage ing data by using redundancy is called
D. Magnetic Tape A. Driver
E. Solid-State Disk
B. Drive
12. Preferred for storing data in large volumes
C. Logic
is the RAID level type
A. RAID 0 D. RAID
B. RAID 5 E. Hard drive

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.1 Overview of Mass-Storage Structure 258

17. How does SSTF scheduling work? B. Level 5


A. running on one end of the disk then to C. Level 6
the other end serving along the way D. Level 0+1
B. serve the request that is closest to
22. How many levels are there in RAID
the head position (smallest / least search
time) A. 7
C. run on one end of the disk then the B. 9

NARAYAN CHANGDER
other end without doing anything C. 3
D. run the algorithm according to the D. 5
queue
23. The magnetic disk component that rotates
18. There is a disk contains 200 tracks (0- the platter is
199) note the request queue (93, 176, 42, A. Spindle
148, 27, 14, 180) and the head is at 55 B. Head
what is the total head movement when us-
ing the Disk Scheduling SCAN algorithm? C. Arm

A. 329 D. Cylinder

B. 230 24. Below are the disadvantages of a Mag-


netic Disk compared to a proper SSD
C. 660
A. The price of Magnetic Disk is more af-
D. 669
fordable than SSD
19. If the disk write only goes half way, or B. Magnetic Disk data storage capacity is
there is a failure in the middle of the trans- less than that of SSD
fer, then it is called C. Magnetic Disk read write speed is
A. Total failure much slower than SSD’s
B. Successful completion D. Magnetic Disk data storage capacity is
more than that of SSD
C. Partial failure
D. Half failure 25. The additional time required for processing
on the disk controller is called
20. Below is storage with a transfer rate of A. Disk Controller
around 150MB/s is
B. Controller Overhead
A. SSD
C. Host Controller
B. Hard drive
D. Bus Controller
C. Magnetic Tape
26. Examples of storage arrays are as follows,
D. Magnetic Disk except
E. Floppydisk A. RAID, Storage Area Network
21. What RAID level does two different parity B. RAID, Network Attached Storage
calculations and then stores them in sepa- C. Storage Area Network, Network At-
rate blocks on different disks? tached Storage
A. Level 4 D. Storage Area Network, SCSI

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.2 Disk Scheduling 259

27. The following is an example of a magnetic A. Linux and Unix


disk B. Client dan server

PRACTICE BOOK» NOT FOR SALE


A. Head
C. I/O ports dan data network
B. Hard drive
D. Input device dan Output device
C. Floppy Disk
32. The acronym for RAID is
D. Magnetic Disk
A. Redundant Array of Independence
E. SSD
Disks
28. RAID consists of 6 levels, where the sixth B. Redundant Array of Independent
level is RAID Drives
A. Using parity bits C. Redundant Array of Independent Disk
B. Using block-interleaved parity D. Redundant Array of Independence
C. Perform disk mirroring Drives
D. Using two parities 33. The main goal of implementing swap space
is
29. Communication media used Network At-
tached Storage is A. Provides optimal results when booting
A. TCP B. Provides optimum results for virtual
memory systems
B. UDP
C. Provides optimum results for applica-
C. RPC
tion
D. IP
D. Provides optimum results for memory
30. Use of disk partitions as a series of large storage
logical blocks without any file system data
structure. This array is called 34. Choose which is the 2 main goals of paral-
lelism
A. raw I/O
A. increase the throughput of multiple
B. party small accesses by load balancing
C. cluster B. increase the data transfer speed to
D. blocking high

31. Computers can access disk storage in 2 C. reduce access response time is great
ways, namely D. improve I/O access to be very fast

10.2 Disk Scheduling


1. Consider a disk system with 100 cylinders. taken to satisfy all requests if it takes
The requests to access the cylinders occur 1ms to move from one cylinder to adjacent
in following sequence:20, 7, 4, 34, 10, 18, one and shortest seek time first policy is
76, 2, 13, 6 Assuming that the head is used?
currently at cylinder 50, what is the time
A. 121ms

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Disk Management 260

B. 119ms A. FCFS
C. 122ms
B. SCAN
D. 120ms
C. LOOK
2. disk scheduling may cause starvation
of some requests. D. SSTF

10.3 Disk Management

NARAYAN CHANGDER
1. A set of tools that allow users to trou- B. Last Known Good
bleshoot, recover, or restore an operating C. BIOS
system when it cannot boot.
D. Boot device priority
A. Advanced Startup Options
5. Use this menu to select the device to boot.
B. PXE
A. Safe Mode
C. Refresh your PC
B. Last Known Good
D. RIS
C. BIOS
2. Used to boot the computer and contains D. Boot device priority
the boot and system files. There can be
only on of these per disk. 6. Which of the following is the maximum
number of primary partitions that can be
A. Primary Partition
created on a single hard disk drive?
B. Active Partition
A. 4
C. Extended Partition B. 8
D. Logical Drive C. 6
3. Marco recently made some partition D. unlimited
changes, and the kernel is not recogniz-
7. Before store Data in HDD the following
ing the partitions. Which of the following
must be done
commands should Marco use to resolve the
problem? A. Branding
A. The partprobe command makes a re- B. Covering
quest to the operating system to re-read C. Low-level formatting
the partition table D. Test it with mobile
B. cat /etc/partitions displays the cur-
rently recognized partitions, but does not 8. A software package used to communicate
perform an update with a client and provide the necessary in-
structions for the client to download OS
C. df displays partition information setup files and begin installation.
D. fdisk-l displays partition information A. Advanced Startup Options
4. Locates and reads the configuration set- B. PXE
tings that are stored in the CMOS memory. C. Refresh your PC
A. Safe Mode D. RIS

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.3 Disk Management 261

9. Which of the following is the maximum 14. All are ways to open disk management in
number logical partitions allowed on an ex- your PC EXCEPT
tended partition?

PRACTICE BOOK» NOT FOR SALE


A. click File Explorer and select the option
A. Unlimited disk management
B. 1 B. use Windows+R button and type for
C. 2 diskmgmt.msc.
D. 4 C. use the search to open for disk man-
agement.
10. Which of the following commands parti-
tions the second hard disk on a Linux sys- D. right-click the start button and select
tem? disk management.
A. The fdisk /dev/sdb command can be 15. What allows users to remove files that
used to open the fdisk utility to partition are no longer needed or that can be safely
the second hard disk deleted?
B. The fdisk /sd0-1 command will return
A. disk defragmentation
“No such file or directory” since the /sd0-
1 device file does not exist B. disk cleanup
C. fThe format /dev/sdb1 command will C. disk management
format the first partition on the second D. disk RAID system
disk. It will not partition the second hard
disk 16. Each sector must be added
D. none of above A. Header
11. A section of an extended partition. B. Trailer
A. Primary Partition C. Data Area
B. Active Partition D. All
C. Extended Partition
17. Restores the computer’s system software
D. Logical Drive
back to its factory state without deleting
12. Loads the configuration settings that were user files or removing modern apps
used the last time that Windows started A. Advanced Startup Options
successfully.
B. PXE
A. Safe Mode
C. Refresh your PC
B. Last Known Good
C. BIOS D. RIS
D. Boot device priority 18. A diagnostic mode used to troubleshoot
Windows and Windows startup issues.
13. Bootstrap Program will do
A. Initialize all CPU registers A. Safe Mode
B. Initialize controllers B. Last Known Good
C. Content of main memory C. BIOS
D. Finds OS kernel on Disk and load it. D. Boot device priority

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.4 RAID Structure 262

19. Which of the following hexadecimal codes 22. A special environment used to boot the
represents an extended partition? computer, connect to the network, and
A. 0x85 represents a Linux extended par- communicate with the server to begin OS
tition installation.
B. 0x82 represents a Linux swap partition A. Advanced Startup Options
C. 0x83 represents a Linux partition B. PXE
D. 0x88 represents a Linux logical parti- C. Refresh your PC

NARAYAN CHANGDER
tion D. RIS
20. There can be only one per hard drive, but 23. This contains the operating system files.
it can be subdivided into smaller sections. There can be up to four per hard drive and
A. Primary Partition cannot be subdivided into smaller sections.
B. Active Partition A. Primary Partition
C. Extended Partition B. Active Partition
D. Logical Drive C. Extended Partition
21. What is the process of consolidating frag- D. Logical Drive
mented files on the user’s hard drive by
which it breaks the data apart so that it 24. All are operating systems that support
will fit into available space? disk management EXCEPT
A. disk defragmentation A. Windows 8.1
B. disk cleanup B. Windows Server 2012
C. disk management C. Windows 10
D. disk RAID system D. Windows XP

10.4 RAID Structure


1. What are the RAID implementation meth- 3. Which option presents one of the functions
ods? of a RAID controller?
A. Entrance and exit A. Administer and control disk aggrega-
B. Front end e Back end tion

C. Hardware e Software B. Control data traffic

D. Hardware and Output C. Identify data write failure


D. Temporary data storage
2. Which part of the RAID levels use the par-
ity technique? 4. The user needs to have the perception of
A. RAID 3 the limited existence of resources and that
they can be acquired whenever he wants
B. RAID 0 and in the desired amount. What feature
C. RAID 2 of Cloud computing are we talking about?
D. RAID 1 A. Wide network access

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


10.4 RAID Structure 263

B. Fast elasticity vices?


C. Self service on demand A. unpredictable costs

PRACTICE BOOK» NOT FOR SALE


D. none of above B. Elasticity

5. Which term from the following list can be C. Local reach only
considered a benefit of using cloud ser- D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11. File-System Interface

NARAYAN CHANGDER
11.1 File Concept
1. Command to create a new sub directory A. File
A. mkdir <dir-name> B. Method
B. mkdirec <dir-name> C. Director
C. mdir <dir-name> D. Protection
D. rm <dir-name> 5. A Standard UNIX client-server file sharing
protocol
2. It is a file attribute that controls who can
do reading, writing and executing A. Client-Server
A. Type B. NFS
B. Privacy C. CIFS
C. Protection D. NIS
D. Policy 6. Each file is given a path name, can have
the same file name for different users, has
3. Recovery Comparing the data in the direc-
search capabilities, but grouping has not
tory structure with the data blocks on the
been done. Is a feature of?
disk is data recovery in a way
A. One-level directory
A. Consistency Checking
B. Two Level Directory
B. Log-Structured File Systems
C. Tree Structured Directory
C. Sun’s ZFS dan Network Appliance
WAFL file system D. Direktori Acyclic Graph

D. Backup and Restore 7. It is a collection of nodes containing infor-


mation about all files
4. The logic storage unit that the operating
system abstracts from the storage device A. Extension
is the notion of B. Directory

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 File Concept 265

C. Disk 12. Which of the following is a division of the


File System?
D. Structure

PRACTICE BOOK» NOT FOR SALE


A. Magnetic Tape
8. A directory that has sub directories and B. Magnetic Disk
files that can be run together is a feature
of C. Mounting Sistem File

A. Direktori Acyclic Graph D. Sequential Access

B. Tree Structured Directory 13. Multimedia file type has a usual extension
of
C. Two Level Directory
A. PDF, JPG, PS
D. One-level directory
B. ZIP, ARC, TAR
9. The Wafl File System The protocols that C. TXT, DOC
help WAFL provide files to clients are?
D. MPEG, MOV, MP3, AVI
A. SSH
14. What file type does exe, com and bin ex-
B. FTP tensions belong?
C. NFS A. Object
D. NFC B. Computer
C. Executable
10. What is meant by sequential access?
D. Library
A. A collection of dots containing informa-
tion about all files 15. It implements complex remote file sharing
B. An access method that can be con- semantics
structed is guided by the direct access A. Andrew File System
method and usually involves constructing B. Unix File System
an index for the file
C. Network File System
C. The direct access method is based on
the disk model of a file, allowing random D. Distributed Information System
access to any block of the file, allowing 16. File ConceptWhat is the function of a file
that random block to be read or written type ending in .o?
D. The access method is carried out with A. Ready-to-run program
one direction of reading and if you want to
go backwards, you need to rewind B. ASCII format for printing
C. Libraries for program routines
11. It move the content of entry Fi in memory D. Compiled code
to directory structure on disk
E. The source code of the programming
A. Close language
B. Open(Fi)
17. A file attribute that is a unique tags (num-
C. Close (Fi) ber) identifies file within file system
D. Open A. Type

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.1 File Concept 266

B. Size 22. Access Method and direct access allow pro-


grams to read and write records quickly in
C. Name
no particular order. The following is an op-
D. Identifier eration on direct access is

18. NFS In accessing files over the network, A. read n


generally use the Remote Procedure Call B. write n
(RPC) protocol. RPC allows the client to
C. rewrite n
perform certain operations. Which opera-

NARAYAN CHANGDER
tions are supported? D. copy n
A. Search for files in a directory 23. Any attributes found in the file
B. Manipulate links and directories A. name, type, time
C. Move files B. location, directors, size
D. Hide files C. size, information stored, floor plan
19. Implementation In implementing the file D. date, name, group
system, which is NOT included in the pro-
cess of the file system system? 24. Free Space Management Which is not a
type of free space listing?
A. File allocation
A. Vektor Bit
B. Disc jolly recording
B. Linked List
C. File System Splitting
C. Grouping
D. File system reliability
D. Blocking
E. Kinerja system file
E. Counting
20. File Sharing Use of the network to allow
25. It is an another name or pointer to an ex-
a file to be accessed by the system. Files
isting file
can be accessed semi-automatically using
the WWW. WWW stands for? A. Unlink
A. Web Wide World B. Hyperlink
B. World Web Wide C. Dictionary
C. World Wide Web D. Link
D. World Wide Web 26. Protection In UNIX systems file protection
E. Wide Web World is divided into 3 parts. Each section repre-
sents a user classification (yi.owner, group
21. There are several ways to access the infor- and universe). Each part is then subdi-
mation in the file, namely vided into 3 bit access types
A. sequential access A. -rwx
B. direct access B. rxw
C. another access method C. -rxw
D. all true D. -wxr

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.2 Directory and Disk Structure 267

27. A model that allows to mount remote file A. RECOVERY


systems from servers B. ROUTINE EXAMINATION

PRACTICE BOOK» NOT FOR SALE


A. Client-Server
C. BACKUP
B. Distributed Network
D. RESTORE
C. Server-Client
E. CREATE FILE
D. World-Wide
29. Entity containing file system known as
28. File System Mounting The operating sys-
tem is assigned a mounting address A. Density
(mount point) which contains the name of B. Volume
the device in question and the location of
the device. Which of the following includes C. Pressure
the process of the Mounting system? D. Allocation

11.2 Directory and Disk Structure


1. The current directory contains, most of the 4. In the tree structured directories
files that are A. the tree has the stem directory
A. of current interest to the user B. the tree has the leaf directory
B. stored currently in the system C. the tree has the root directory
C. not used in the system D. all of the mentioned
D. not of current interest to the system
5. When a user refers to a particular file in
two level directory?
2. What will happen in the two level direc-
tory structure? A. system MFD is searched
A. each user has his/her own user file di- B. his own UFD is not searched
rectory C. both MFD and UFD are searched
B. the system doesn’t its own master file D. every directory is searched
directory
6. The directory can be viewed as a that
C. all of the mentioned
translates file names into their directory
D. none of the mentioned entries.
A. symbol table
3. What is the disadvantage of the two level
directory structure? B. partition
A. it does not solve the name collision C. swap space
problem D. cache
B. it solves the name collision problem
7. When a user job starts in a two level di-
C. it does not isolate users from one an- rectory system, or a user logs in
other
A. the users user file directory is
D. it isolates users from one another searched

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 File systems 268

B. the system’s master file directory is user name or account number, and each
not searched entry points to the UFD for that user
C. the master file directory is indexed by D. all of the mentioned

11.3 File systems


1. A program currently being worked in by B. mount /mnt/newdisk /dev/sdc1
the user.

NARAYAN CHANGDER
C. mount /dev/sdc /mnt/newdisk
A. Lock Screen
D. none of above
B. Screen Saver
6. u are preparing to mount a device local to
C. Active Program
your system. Which directory holds the
D. Guest Account device files?
2. One byte is composed of A. the files for devices are always stored
in /dev according to the FHS.
A. 1 bit
B. /devices
B. 8 bits
C. /local/dev
C. 10 bits
D. 255 bits D. none of above

3. Which two of these are part of the key op- 7. You suspect your /dev/sda3 partition is
erating system functionality? in need of repair.Which of the following
e2fsck options will repair the errors with-
A. anti-spyware software out any interaction from you?
B. web browser A. Use e2fsck-p to automatically repairs
C. file management the ext2 file system without any interac-
D. user interface tion from you
B. -f forces a file system check, even
4. To open a file, all you need to do is on when the file system appears clean
the file icon.
C. -n opens the file system as read-only
A. Right-Click and automatically answers all questions
B. Double-click no
C. Click on the file name D. -y automatically answers all questions
D. Type name in search Bar yes

5. You have partitioned and formatted a new 8. f you want to move a file from its current
hard drive, sdc. You want to mount location to a folder, you can select the file
the first partition on sdc to directory and then it into the folder.
/mnt/newdisk. Which command will per- A. Cut
form the mount correctly?
B. Copy
A. The correct format for mount is mount
item and mount point.mount /dev/sdc1 C. Drag
/mnt/newdisk D. Paste

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 File systems 269

9. What is the primary purpose of perform- C. Subtractive primary colours


ing an offsite backup or storing backups in D. Subtractive secondary colours
an offsite location?

PRACTICE BOOK» NOT FOR SALE


14. Which filesystem is used to store informa-
A. Valuable data is protected in case of a
tion about current running processes? (se-
disaster.
lect 1)
B. There will be no disruption of service
A. /environment
in case of a disaster.
B. /proc
C. Backups should be stored away from
computers because of the magnetic fields C. /etc
generated by computers. D. /dev
D. It prevents mixing up of backed up 15. To create a new folder on the desktop,
data. right-click on the desktop and on the short-
10. Which tab on the Ribbon in the folder win- cut menu choose new and then
dow allows users to change how the con- A. Save As
tents of the folder are being shown? B. Folder
A. View C. New Document
B. Computer D. Create Short Cut
C. File 16. Which of the following directories is spec-
D. Layout ified by Filesystem Hierarchy Standard
(FHS) as a mount point for removable me-
11. The most popular archive program on Unix dia, such as USB storage media, DVDs, CD-
is tar. It means tape archive. Other popu- ROMs, and Zip disks?
lar archiving programs are:
A. /media is specified by Filesystem Hier-
A. Cpio archy Standard (FHS) as a mount point for
B. Ar removable media
C. Dump B. mnt is often used for temporarily
mounted filesystems
D. Zip
C. / represents the root directory of the
E. 7z
Linux system and is not recommended as
12. Which is a storage device? a mount point for removable media
A. Monitor D. none of above

B. Flash Drive 17. What is computer file system?


C. Speakers A. It is a software used for the internet
to work.
D. Keyboard
B. It is software system designed to col-
13. Red, Green, and Blue light can be mixed to lect information in the world wide web.
form (almost) any other colour. They’re C. It is used to keep and reopen files or
called the data in a computer.
A. Additive primary colours D. It is a folder in a computer consists of
B. Additive secondary colours different files.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 File systems 270

18. A folder within a folder is known as which 23. Where are all the processes kept on the
of the following? server in flat files? (select 1)
A. Nesting Folder A. /etc
B. Path B. /proc
C. Sub-Folder C. /usr
D. Linked Folder D. /var

NARAYAN CHANGDER
19. Partition details such as information about 24. A picture or design on the desktop.
blocks, block and file pointers A. Screen Saver
A. Partition Control B. Desktop Background/Wallpaper
B. Boot Control Block C. Icon
C. Partition Control Block D. User Account
D. Partition 25. Which of the following is the MOST com-
mon Linux file system?
20. Testing your backups ensure that
A. Ext4 is the most common Linux file sys-
A. the backup will actually restore tem
B. the backup with continue writing files B. JFS
C. the backup with stop working C. ReiserFS
D. none of above D. none of above

21. File System means that each department 26. What factors should be considered when
in an organization has their own sets of deciding on a backup procedure
files concerning the same subjects or items.
A. When to backup
This will lead to
B. Why backup
A. Increase Data Security
C. What to backup
B. Increase data Redundancy
D. Where to backup
C. Increase cost of managing the system
E. Who to backup
D. Increase the integrity of the data.
27. Where is user data stored when a user is
22. Which of the following Linux file systems created on the server? (select 1)
support journaling?
A. /root
A. The ext4 file systems support journal-
B. /home
ing
C. /lib
B. VFAT is a FAT32 file system for Linux
and does not support journaling D. /usr

C. The swap file system is a pseudo file 28. Businesses can often suffer data loss, ei-
system and is used as virtual memory ther accidentally or maliciously if they do
D. The ext2 file system does not support not have what in place?
journaling A. IT Staff

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 File systems 271

B. Backup & Recovery procedures 34. A file has (tick four from below)
C. Word processing software A. A filename (inc. extension)

PRACTICE BOOK» NOT FOR SALE


D. System software B. A file path
C. file contents (binary data)
29. While files could contain arbitrary unfor-
matted data, it would be more useful if it D. a permanently assigned application
were organized. We call this system of or- E. metadata maintained by the OS (e.g.
ganization a last opened)
A. File Format
35. The configuration files of the services are
B. File Folder saved here (select 1)
C. Data Format A. /lib
D. Data Folder B. /dev
C. /proc
30. Each file is a linked list of blocks (no exter-
nal fragmentation). D. /etc
A. Indexed Allocation 36. Understands files, logical address, and
B. Linked Allocation physical blocks-translates logical block #
to physical block #-Manages free space,
C. Contiguous Allocation
disk allocation
D. none of above A. Logical File System
31. Caches pages rather than disk blocks using B. Basic File System
virtual memory techniques and addresses. C. File Organization Module
A. Unified Buffer Cache D. File Control Block
B. Page Cache
37. Information about how to boot an OS
C. Buffer Cache
A. Boot Control Block
D. none of above
B. Operating System
32. In an office with working hours from 8am C. Boot Up
to 5pm, what is the best time to backup? D. BIOS
A. 5pm
38. You have created a separate partition for
B. 8am the sales team and mounted it to the
C. 12pm /sales directory. The team is about to be-
gin a new project, and they want to make
D. 6am
sure there is enough disk space to hold up-
33. Which file system is a FAT32 file system coming files.Which of the following com-
for Linux? mands will show you the amount of free
space?
A. VFAT is a FAT32 file system for Linux
A. Use the df /sales command to view the
B. FAT64 free space on the partition
C. FX B. Use the free command to show mem-
D. none of above ory statistics

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 File systems 272

C. Use the diff command to compare two C. File system


files D. search engine
D. none of above
43. Which of the following is a best practice
39. If person A want to transfer fund of when backing up data?
Rs.500 to person B. If failure occurs after A. Back up your data to an external de-
removing Rs.500 from Account A and be- vice, a network drive or the cloud.
fore transferring to Account B then prob-
B. Back up your data on a separate parti-

NARAYAN CHANGDER
lem caused is
tion of the same data drive.
A. Data redundancy C. Back up your data to the same parti-
B. Data Isolation tion that contains the Windows operating
C. None of these system.
D. There is no need to back up data.
D. Data Atomicity
44. Manage I/O devices at the I/O layerGive
40. What command would you enter at the
command like “read drive 1”
command prompt to list all files and direc-
tories in the badams home directory along A. Device Drivers
with a file size and a total amount of space B. Basic File System
taken up by the directory? C. Logical Devices
A. Use du /home/badams to lists all files D. Devices
and directories in the badams home di-
rectory along with a file size and a total 45. Which directory is used to store Kernel
amount of space taken up by the directory information needed to start the OS on
startup? (select 1)
B. The du command displays files and file
sizes in and below a specified directory A. /dev
C. -a evaluates all files, not just B. /proc
directories.-c lists a total amount of space C. /etc
used in the directory D. /boot
D. none of above
46. What is the name of the top level folder in
41. Using locally attached storage is usually a folder structure called?
for a home/small business A. The top
A. cost effective B. The leaf
B. safer C. The root
C. more reliable D. The shrub
D. none of these 47. Each file has its own index block(s) of
pointers to its data blocks.
42. It is the collective term for all the docu-
ments, photos, videos and others in com- A. Linked Allocation
puter. B. Indexed Allocation
A. File C. Contiguous Allocation
B. File folder D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 File systems 273

48. Bitmaps store image information as a se- C. /usr/lib


ries of numbers that each represent D. /tmp

PRACTICE BOOK» NOT FOR SALE


A. Pixels
54. Which of the following statements regard-
B. Voxels ing File History is NOT true?
C. Pixars A. File History can restore files but not en-
D. Vowels tire folders.

49. Provides a set of remote procedure calls B. File History files should be saved on a
for remote file operations separate drive from the drives containing
the files.
A. CIFS
C. File History allows the user to choose
B. NFS how long copies should be saved.
C. HTTP D. File History allows the user to exclude
D. FTP designated user profile files or folders
from backing up.
50. Software which manages a device’s mem-
ory, processes and hardware. 55. What is the parent directory for system
crash files?
A. Hard Drive
A. /tmp
B. Universal Serial Bus
B. /var
C. Operating Systems
C. /usr
D. Desk Top
D. /proc
51. storage attached directly to a workstation
is known as 56. What directory contains all the devices and
their references in the file system? (select
A. local storage
1)
B. network storage
A. /mnt
C. cloud storage
B. /lib
D. none of above
C. /dev
52. Security is a major issue with this type of D. /home
storage
57. Which directory contains commands that
A. cloud storage can be used by all accounts? (select 1)
B. network storage A. /bin
C. local storage B. /tmp
D. none of above C. /proc
53. Within which hierarchy is cached data D. /lib
stored for both yum-and apt-style Sys-
tems? (select 1) 58. You can rename a folder by right-clicking
on the folder and choosing from the
A. /var/cache shortcut menu and then typing in the new
B. /etc name.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 File systems 274

A. View 63. list content of a compressed file, what is


the correct command below?
B. Insert
A. zmore
C. Rename
B. zcat
D. Font
C. gcat
59. Manages metadata information. Trans- D. gmore
lates file name into file number, file handle,
E. gzmore

NARAYAN CHANGDER
location by maintaining file control blocks
A. Logical File System 64. What is a significant advantage of cloud-
based backups?
B. File System
A. The backups are available anywhere
C. File Block System
with internet connection.
D. Basic File System
B. The cost is lower for cloud-based back-
ups than for local backups.
60. Which of the following is a method for
opening a file? C. Restore time is lower than for local
backup and restore scenarios.
A. Dragging the file to the Start button
D. Cloud-based backups are far more se-
B. Dragging the file to the taskbar
cure than local backups.
C. Double-clicking on the file name
65. A network-based data backup is stored
D. Left-clicking mouse on the file name

61. A screen which serves as a workspace A. in file servers


for running programs, opening and storing B. off site
files.
C. on DVDs
A. Start Menu
D. on USB
B. Lock Screen
66. Hierarchical File Systems
C. Background
A. Store files in folders
D. Desktop
B. Start out with a Root directory
62. If a computer has multiple secondary stor- C. Don’t move files in memory, only the
age devices connected, how will it know index changes
which one to check first for the operating
D. store file locations in multiple Direc-
system software?
tory Files
A. It will use the one connected to the pri-
mary motherboard connector 67. What can cause a business incur cost when
access to data is lost
B. It will check the boot order sequence
from the BIOS A. Loss of systems

C. It will inspect all of them at the same B. Loss of management


time to find an operating system C. Loss of IT staff
D. none of above D. Loss of productivity

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 File systems 275

68. “This problem arises due to the scatter- 72. Which of the following is not a file format
ing of data in various files with various extension?
formats. Due to the above disadvantages

PRACTICE BOOK» NOT FOR SALE


A. .png
of the earlier data processing system, the
necessity for an effective data processing B. .ftv
system arises. “File system suffer this C. .jpg
problem. This problem refers to
D. .gif
A. Isolation Of Data
B. Security Problems 73. pack, unpack are useful compressing utili-
ties if only:
C. Difficulty in accessing data
A. (extension z)
D. Data Integrity Problem
B. (usually files less than 8MB)
69. Slack space lets us C. (extension z) & (usually files less than
A. Make a small file bigger without frag- 8MB).
menting data D. None of the above
B. Make a big file smaller by compressing
data 74. Each file occupies a set of contiguous, or
adjacent blocks.
C. Break a large file into smaller chunks
A. Linked Allocation
D. Quickly erase data
B. Indexed Allocation
70. What is a file?
C. Contiguous Allocation
A. The smallest container within a com-
D. none of above
puter’s storage system that is used to
store information such as data, settings, 75. A long horizontal bar typically located at
and commands used in a computer pro- the bottom of the screen.
gram.
A. Task Bar
B. The methods and structures that an op-
erating system uses to organize files on a B. Header
storage device like a hard drive. C. Icon
C. Reencoding a file to consume less stor- D. Short Cut
age space.
D. The process of converting information 76. What is In-Memory Structure?
so it cannot be understood without de- A. Partition table:information about each
crypting it using a key, especially to pre- mounted partition
vent unauthorized access.
B. Directory structure:information about
71. Writes more common, buffer-able, faster recently accessed directories
A. Synchronous C. System wide open file table:copy of the
File control block of each open file
B. Asynchronous
D. Per-process open file table:pointer to
C. Efficiency the entry in the system wide open file ta-
D. Track ble

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 File systems 276

77. It is a folder in a computer which consist D. uname shows information about the
of different files. system
A. file 82. Which of the following file types is associ-
B. file folder ated with Microsoft®Word?
C. file system A. .xlsx
D. web browser B. .docx
78. What kind of storage can put increased C. .pptx

NARAYAN CHANGDER
pressure on connection D. .pub
A. Full backup
83. Which folder contains the Kernel,
B. Email firmware, and other related system files?
C. Data (select 1)
D. Remote A. /proc
79. What would you typically use to save a B. /boot
image? C. /root
A. .png D. /sys
B. .jpg
84. A LOCAL data backup is stored
C. .gif
A. on site
D. .wav
B. off site
80. Which of the following items in the folder C. in the cloud
window allows users to view locations
which have been visited before? D. in file servers

A. Previous locations arrow 85. You can also create a folder within a folder.
B. Refresh button These folders are often called
C. Navigation pane A. Files
D. Search box B. Icons
C. Folder Short cuts
81. Anna is attempting to unmount the mount
point /mnt/data. The umount command D. Sub-folders
failed and displayed error message stat-
86. Which Windows utility should be used if a
ing that the device is busy. Anna suspects
user wants to restore a Windows system
there my be an open file causing the is-
with an exact copy of the drive, all applica-
sue. Which of the following commands
tions, files, and configurations at the time
will show Anna a list of open files?
of the backup?
A. lsof displays open files in the file sys-
A. System Protection using Restore
tem
Points
B. awk is an interpreter for the AWK text
processing language B. System Recovery

C. stat displays the status of a file or pro- C. Reset this PC


cess D. System Image

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 File systems 277

87. Data stored at the front of the file ahead 92. You have a Linux system with two
of any content is called the activated swap partitions, sda3 and
sdb2.Which of the following commands

PRACTICE BOOK» NOT FOR SALE


A. Prologue
can you use to deactivate only the sda3
B. Header swap partition?
C. Extension A. The swapoff /dev/sda3 command will
D. Log deactivate the sda3 swap partition

88. A linear list with a hash data struc- B. The swapoff-a command will de-
ture.*decreased search time*good if en- activate all swap partitions listed in
tries are of a fixed size*collisions can occur /etc/fstab
when two file names hash to the same lo- C. The pvcreate command is used to cre-
cation ate LVM physical volumes
A. Hash Table D. none of above
B. Linear List 93. To save a file in a folder, in the program
C. Hash Data Structure you are working in, click on the File tab
D. Linear Data and choose the Save As option and then
When the Save As window opens, lo-
89. You can change how items appear in a cate the folder in which you would like to
folder by clicking on the tab in the save the file.
folder window and then in the Layout A. Browse
group choosing an option from the group.
B. Open
A. View
C. New
B. Copy
D. Save As
C. Browse
D. New Folder 94. What important danger must be consid-
ered when using cloud storage?
90. Which of the following files is the location A. Data security
used to gather information about load av-
erage for use in the uptime command? (se- B. Data transfer speed
lect 1) C. Data integrity
A. /proc/uptime D. Data recovery
B. /proc/loadavg 95. “Database management System allows
C. /proc/load specific users to access specific part of the
D. /proc/utime database. This capability is not available
if you are using File System”The above
91. Which storage type is encoded as a single statement refers to the database ability to
enormous list of ones and zeroes.
A. File systems A. Limit Access Cntrol
B. Files B. Create Backup
C. File formats C. Recover damage or lost data
D. Compression & Encryption D. Allows multiple access to the database

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 File systems 278

96. Storage Structure consisting of informa- 101. Which of the following command al-
tion about a file-inode #-file dates-file lows you to use an alternative superblock
owner-file size-file data blocks or pointers when the primary superblock has been cor-
to file data blocks rupted?
A. File System A. Use the e2fsck-b 16385 /dev/sda1
command to use the alternative su-
B. Basic File System
perblock at block 16385
C. File Organization Module
B. The mke2fs-n /dev/sda1 command

NARAYAN CHANGDER
D. File Control Block tells you the locations of the superblocks
on the disk
97. Hardware Abstraction means that we can
C. /dev/sd1 command starts the fsck util-
ity on the device
A. Treat different storage devices identi-
D. none of above
cally
B. Write different programs for different 102. Files and directories are kept both in main
storage devices memory or disk
C. Control where on a device the data is A. Backup
stored B. Logical File System
D. Erase magnetic tapes and re-use them C. Recovery

98. What does the / directory signify? (select D. WAFL File System
1) 103. if block[I] is free0 if block[I] is occu-
A. Root directory piedEasy to locate the first free block
B. An empty directory A. Bit Vector or Bit Map
C. A new directory B. Grouping
D. none of above C. Counting
D. Space Maps
99. Identify the advantages of Database man-
agement system? 104. Which utility can be created that makes a
bootable usb drive that contains the Win-
A. Data Ingrity
dows system files to conduct a complete
B. All of these Windows restore?
C. Ruduction in Data Rudendency A. File History
D. Centralize Management B. Recovery Drive
C. System Image
100. Data Isolation caused due to in tradi-
tional file system. D. System Recovery
A. Scatter of Data 105. You have added several new hard disks
B. Duplicate Data to your system. After partitioning and for-
matting, you have modified a configura-
C. Complex Data
tion file to mount these new file systems
D. Atomic Data automatically. You want to document the

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 File systems 279

change you made.Which of the following 109. What does Compression mean?
configuration files would you document? A. Reencoding a file to consume less stor-

PRACTICE BOOK» NOT FOR SALE


A. document the changes you made in age space.
/etc/fstab B. The process of converting information
B. /etc/inittab defines the initial pro- so it cannot be understood without de-
cesses on boot-up crypting it using a key, especially to pre-
vent unauthorized access.
C. etc/modules.conf defines kernel load-
C. The way a file is organized. File for-
able modules
mats are indicated by an extension such
D. /etc/crontab defines jobs that run at as .jpg, .gif, .png., .mp3, .wav, .wma, .mp4,
particular dates and times .avi, and .wmv.
D. The methods and structures that an op-
106. Consider these two statements”The op-
erating system uses to organize files on
erating system is stored on the computer’s
a storage device like a hard drive. File
ROM””The operating system software is
systems often use directory structures to
loaded into RAM & executed as the final
keep track of files.
stage of boot up”
A. The first statement is FALSE and the 110. which folder is default directory for ac-
second statement is FALSE count root? (select 1)
A. /srv
B. The first statement is FALSE and the
second statement is TRUE B. /
C. The first statement is TRUE and the C. None of the above.
second statement is FALSE D. /home
D. The first statement is TRUE and the E. /usr
second statement is TRUE 111. Which Windows utility that allows users
to back up files/folders, save multiple ver-
107. Resides on secondary storage.Provides
sions of changes to those files/folders,
efficient and convenient access to disk and
and restore from those versions?
by allowing data to be stored, located and
retrieved easily A. Reset this PC
A. Basic File System B. System Image
C. File History
B. File Control Block
D. System Protection using Restore
C. File System Points
D. File Organization Module
112. *You don’t need a powerful computer
108. An account which is used for everyday with a huge hard drive-everything is
computing stored and run on a remote computer is an
advantage of what?
A. Standard Account
A. the Internet
B. User Account B. Local area networks
C. Administrator Account C. optical devices
D. Guest Account D. cloud storage

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 File systems 280

113. Which of the following backup options 118. A unique name which identifies users to
are considered removable media? Windows
A. USB flash drives A. Password
B. NAS devices B. Identifier
C. Cloud storage C. Administrative Code

D. Internal drives D. User Name

NARAYAN CHANGDER
119. A separate section of main memory for
114. You can view the properties of a file by
frequently used blocks.
right-clicking on the file’s icon and then
choosing from the shortcut menu. A. Unified Buffer Cache
A. File B. Page Cache
B. Folders C. Buffer Cache

C. Documents D. none of above

D. Properties 120. What directory contains read-only user


data? (select 1)
115. A menu which lists actions the user can
A. /usr
take with an object.
B. /var
A. Start Menu
C. /tmp
B. Shortcut Menu
D. /proc
C. Screen Saver
121. Metadata is data about:
D. Task Bar
A. Data
116. Which type of backup medium protects B. Meta
you from a catastrophic natural event in
your area? C. Changes

A. Cloud storage D. Size

B. Internal drive 122. WAV files store audio as a series of num-


bers. Each number represents
C. External drive
A. The amplitude of the sound wave
D. Flash drive
B. The frequency of the sound wave
117. Manage memory buffers and caches (Al- C. The time of the sound wave
location, freeing, replacement)Given com-
mand like “retrieve block 123” translates D. The magnitude of the sound wave
to device driver
123. Which Windows utility should be used if a
A. Basic File System user has an issue after completing a driver
update or system change and wants to re-
B. File Organization Module
vert Windows back to the previous work-
C. Logical File System ing configuration?
D. File System A. Reset this PC

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 File systems 281

B. System Protection using Restore A. The Ext4 file system is more efficient at
Points storing small files than most file systems
B. ext2

PRACTICE BOOK» NOT FOR SALE


C. Driver History
D. System Recovery C. ext3
D. none of above
124. Where can you find essential system bi-
naries? (select 1) 129. To move a file, modern computers
A. /sys A. Erase the old data, then write it in a
B. /bin new location
C. /proc B. Write the data in a new location, then
erase the old data
D. /sbin
C. Write the new data, then update the
125. Which Windows utility should be used if directory file to the new location
a user needs to restore a system with a D. Write the new data, erase the old data,
clean install of Windows but allow you to then update the directory file to the new
keep your personal files if you’d like? location
A. System Recovery
130. All files are long lists of numbers stored
B. System Protection using Restore in a list, with a header containing
Points A. Instructions on how to use them
C. System Image B. An index of where they’re locaded
D. Reset this PC C. Cyphers for how to decrypt them
126. Back ups help a tech D. RGB values
A. save time and effort 131. Which of the following commands for-
B. make money mats the second partition on the fourth
disk drive with the ext3 file system?
C. create a new OS
A. the mke2fs-j /dev/sdd2 to make an
D. install apps
ext3 filesystem
127. Select the three types of user interface B. fdisk is used for partitioning a drive,
studied yesterday not for creating a filesystem
A. command line interface C. mke2fs-e3 /dev/sdd2 will return an er-
B. multiple document interface ror because there is no-e3 option

C. graphical user interface D. format is not a standard Linux com-


mand
D. menu driven interface
132. The slowest way to back up data is to
E. WYSIWYG

128. The system requirements for a new Linux A. manually move each file to a destina-
computer show that the system will pri- tion
marily be used to store documents of small
B. run a backup program
size.Which of the following file systems
would be the MOST efficient at storing C. copy and paste using the keyboard
these documents on a Linux system? D. none of these

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 File systems 282

133. A backup of the data that has changed is debugfs utility.Which of the following de-
known as bugfs options should you use to examine
A. Incremental backup the file system?
A. Use debugfs-c to specify the file sys-
B. Full backup
tem should open in catastrophic mode
C. Differential backup
B. -w specifies the filesystem should
D. Data backup open in read-write mode
C. -f executes commands in a text file

NARAYAN CHANGDER
134. Defragmentation is no longer necessary
on Solid State drives. On older drives, it D. -Z prints the version number of de-
was needed to bugfs and exits
A. Put fragments of files together to 138. Text files contain a string of numbers
speed up access stored in binary. These numbers are
B. Break files into smaller fragments to translated into letters through a standard
fit files in small spaces called:
A. ASCII
C. Delete fragments of unused data
B. ANSI
D. Copy files to another drive
C. IANA
135. tar archives command description: D. IEEE
A. -c create archive
139. Which of the following describes the ef-
B. -r update (append files or replace ex- fects of the tune2fs-j /dev/sdb1 com-
isting files with newerversions) mand?
C. -t extract files A. tune2fs-j /dev/sdb1 converts the
/dev/sdb1 device file system from ext2
D. -u append
to ext3 without affecting the data on the
E. -x list drive
136. You are inspecting the superblocks and B. -c adjusts the number of mounts after
block information on your file system. You which the file system will be checked
need dumpe2fs to display only the blocks C. -e remount-ro remounts the file sys-
that are reserved as bad in the file sys- tem as read-only
tem.Which of the following options should D. -l lists the contents of the file system
you use? super block
A. Use dumpe2fs-b to print the blocks
140. To properly access stored data, we need
that are reserved as bad in the file system
to use a Directory File at the start of the
B. -h prints only super block information storage device. This directory file contains
C. -x prints group information block num-
bers in hexadecimal format A. An index of where each file is
D. none of above B. Identification of each file’s type
C. Metadata about each file
137. Your ext3 file system has experienced a
significant amount of corruption. To exam- D. The contents of each file
ine the file system, you want to use the E. a system of folders and subfolders

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 File systems 283

141. Another method of deleting files is to se- 146. What hardware does the file manage-
lect the file and then pressing the key ment functionality provide a level of ab-
on the keyboard. straction on?

PRACTICE BOOK» NOT FOR SALE


A. Backspace A. printer
B. Icon B. secondary storage
C. Cut C. input/output

D. Delete D. processor

147. After installing a new package, in which


142. Select 2 other types of backups
directory are you most likely find its con-
A. System backup figuration file? (select 1)
B. Cyber backup A. /lib
C. Full backup B. /etc
D. Differential backup C. /usr
E. First level backup D. /opt
E. /var
143. What format for image files that sup-
ports both animated and static images 148. An operating system (tick all that ap-
be? plies)
A. jpg A. is software
B. mp3 B. allows the user to browse the
world wide web
C. png
C. manages files and folders for the
D. gif user
144. Uses the same page cache to cache both D. allows the user to communicate
memory-mapped pages and ordinary file with the hardware
system I/O to avoid double caching data.
149. If DBA modify the structure of the data
A. Unified Buffer Cache record then this modification do not affect
B. Page Cache other application is called as
A. Data Isolation
C. Buffer Cache
B. Data Independent
D. none of above
C. Data security
145. What is the name of the software which D. Data integrity
is run from ROM when the computer is
powered on? 150. “There is only one source for the data.
A. Basic Input Output System Everyone or every program that wants to
use the data must get it from the same
B. Basic Instruction Operation Software source”The above statement will
C. Beginning Input Output Sequence A. Increase Data Redundancy
D. none of above B. Increase data Quality

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


11.3 File systems 284

C. Reduce data security default software for each extension


D. Create multiple copy of the same data D. none of above
151. An operating system knows what default 152. Pixels are composed of three numbers,
application software to use to open a file representing:
by
A. Red, Green, and Blue
A. examining the full contents of the file
B. Cyan, Magenta, and Green
B. sending messages to all the installed

NARAYAN CHANGDER
applications to request permission C. Hue, Shade, and Tint
C. looking at the file extension & its list of D. Length, Width, and Height

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


PRACTICE BOOK» NOT FOR SALE
12. Protection

12.1 PROTECTION AND SECURITY


1. A “data harvesting tool” is: 4. Programs that look useful, but cause dam-
A. illegal software used to steal pass- age to your computer
words A. phishing
B. software used to gather information B. spyware
about individuals
C. worms
C. a type of input device
D. trojans
D. a type of virus

2. Which of the following is true? 5. When data has been processed and is
meaningful, which of these has it be-
A. Which of the following is true? come?
B. Viruses cannot be spread via email
A. Information
C. Viruses can completely destroy all the
data on your computer B. Processed data

D. Anti-virus software will always pre- C. Identifiable data


vent a virus from attacking your computer D. Profiled
3. A type of malware which restricts access
6. Temporary memory on your computer that
to the computer system that it infects, and
is sometimes used to store local copies of
demands a fee be paid to the operators of
files opened when you browse the Inter-
the malware in order for the restriction to
net.
be removed is known as?
A. Ransomware A. backup

B. Virus B. firewall
C. Spim C. cache memory
D. Spam D. encryption

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.1 PROTECTION AND SECURITY 286

7. An example of trade secret is C. must register with the Data Protection


A. how to play games Registrar
D. must register with the Local Authority
B. a recipe to make a snack
C. how to run 12. Any action that compromises the security
of information owned by an organization.
D. none of above
A. Security Attack
8. What is the purpose of a DDoS attack? B. Security Mechanism

NARAYAN CHANGDER
A. To use multiple computers to flood a C. Security Algorithm
network or server with internet traffic in D. Security service
order to disrupt service
13. Apart from our usernames and password,
B. To use a single computer to flood a net-
what is extra layer of security that can be
work or server with internet traffic in or-
used to protect our online accounts?
der to disrupt service
A. PIN
C. To use multiple computers to infiltrate
a network in order to steal data or to plant B. Strong passwords
a virus C. 2 Factor Authentication (2FA)
D. To use a single computer to infiltrate a D. Pattern
network in order to steal data or to plant
14. This is any illegal act involving a computer.
a virus
A. cybercrime
9. How many aspects of protection of the se- B. Trojan Horse
curity of computers are they?
C. hacking
A. 3
D. identity theft
B. 4
15. If you receive an email from a well-known
C. 5 company, but its name is misspelt in the
D. 6 sender’s address, you should:
A. click on the link in the email to check if
10. A computer virus may:
it’s genuine
A. overwrite your files and corrupt your B. reply, pointing out the error
data
C. report it as a possible phishing scam
B. steal important information from your
D. forward the email to a friend to check
computer
C. use a lot of memory and slow down 16. Identify two qualities of a good password.
your computer A. It should be more than 10 characters
D. all of these long
B. It should be written down on a piece
11. An organisation such as a school holds per- of paper
sonal data about you. The organisation:
C. It should be attached to you.
A. has to ask your permission to keep D. It should be a mixture of upper, lower
your data on their computer case letters, numbers and special charac-
B. must delete the data when you leave ters

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.1 PROTECTION AND SECURITY 287

17. ‘Revolving backups’ refer to: 21. A loss of is the unauthorized disclosure
A. the last several backups are kept. of information.

PRACTICE BOOK» NOT FOR SALE


A. confidentiality
B. only files that have been changed since
the last backup. B. Integrity
C. backup stored on a cloud. C. Authentication
D. a facility whereby a computing sys- D. Nonrepudiation
tem can be installed to begin immediate
22. When disposing of an old computer, to pro-
backup operations.
tect your personal information it is suffi-
18. Which of the following represents the cient to:
three goals of information security? A. delete all the files on your computer
A. Prevention, detection, and response B. empty the recycle bin
B. People controls, process controls, and C. reformat the hard drive
technology controls
D. none of these
C. Confidentiality, integrity, and availabil-
ity 23. A fraudulent email which is trying to ob-
tain your username and password for a
D. Network security, PC security, and particular site will typically:
mainframe security
A. have a heading with a logo which ap-
19. What is meant by ‘trusted recovery’? pears genuine
A. It is a process of salvaging inaccessi- B. address you by name
ble, lost, corrupted, damaged or format- C. offer large sums of money
ted data from secondary storage, remov-
able media or files. D. appear to come from a friend

B. Bringing a system to an operable con- 24. In cybersecurity, what does CIA stand
dition after a disaster so that it can again for?
accept and process data. A. Confidentiality, Integrity, Availability
C. An organized approach to addressing B. Central Intelligence Agency
and managing the aftermath of a security
breach or cyberattack C. Cybersecurity Investigation Agency
D. Cybersecurity, Internet, Accessibility
D. It is the ability to ensure recovery with-
out compromise after a system failure. 25. Which of the following devices is not con-
nected to the Internet of Things?
20. The act of extracting personal information,
such as passwords and credit card details, A. An AM/FM radio without any bluetooth
from computer users and then use the in- or Internet connection capabilities
formation for malicious purposes. B. A wearable device that measures your
A. phishing physical activity and allows you to track
your activity through a mobile app
B. intellectual property
C. A smart thermostat that allows you
C. computer security to remotely control your home’s temper-
D. online predator ature through a mobile app

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.1 PROTECTION AND SECURITY 288

D. A digital baby monitor that allows you A. encrypt


to stream video and audio of your nursery
B. decrypt
from the Internet
C. ISP
26. What is the youngest age you can be
D. password
charged of a Computer Misuse act of-
fence?
31. You can protect your files from unautho-
A. 12 rised access by:

NARAYAN CHANGDER
B. 14 A. only allowing your friends and family
C. 16 to know your passwords
D. 18 B. making frequent backups
C. choosing a strong password and
27. A computer program that is designed to
changing it regularly
cause malfunctioning of a computer or
damage the data stored on the computer. D. never using computers in a public
place such as a library
A. worm
B. virus 32. A destructive computer program disguised
C. Trojan horse as a game, utility, or software. When run,
a Trojan horse does something harmful to
D. online predator the computer system while appearing to
do something useful.
28. This is identified as threats or harassment
made via email, text, IM. A. Trojan horse
A. cybercrime B. spyware
B. salami shaving C. software piracy
C. identity theft D. spam
D. cyberbullying
33. In 2016, online fraud cases in the United
29. An Internet security protocol that ensures States resulted in victim losses totaling:
secure data communication by encrypting A. Nothing-online fraud doesn’t result in
the information transmitted. The SSL pro- victim losses
tocol certifies that a Web site is genuine
and ensures that the data provided to the B. $100, 000
site is not misused. C. $2 million
A. decrypt D. Over $1.2 billion
B. encryption
34. Message means that the sender and
C. Secure Sockets Layer (SSL) the receiver expect privacy.
D. hacker
A. confidentiality
30. A unique string of characters that a user B. integrity
types in as an identification code. It is a
C. authentication
security measure used to restrict access to
computer systems and sensitive files. D. none of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.1 PROTECTION AND SECURITY 289

35. When upgrading computers, what is the 40. The Act which specifies the rules about col-
term given to old electrical equipment to lecting and holding personal data is called:
be disposed of?

PRACTICE BOOK» NOT FOR SALE


A. the Criminal Misuse Act
A. electronic landfill B. the Data Protection Act
B. recycled C. the Personal Data Act
C. e-waste D. the Health and Safety Act
D. redundant electronics
41. You receive an email in your inbox from
36. The law states that: your friend sara. the title of the email is
“this is so cool!” and inside the email is an
A. only government organisations can attachment with an .exe extension.what
hold personal data about you should you do?
B. personal data held by an organisation A. delete the email
must be protected from hackers
B. click the attachment
C. personal data must be updated at
C. run virus scan, then click the attach-
least once a year
ment
D. all personal data must be encrypted
D. call sara to see if she sent you the mail.
37. Which is NOT a type of malware? 42. What option can you configure on your
A. Virus workstation to increase security when you
leave your desk?
B. Worm
A. file encryption
C. Trojan horse
B. multi factor authentication
D. Sandwich
C. single sign-on
38. Which of these is an indicator that a web- D. Screensaver password
site is secure?
A. The URL includes the company name 43. An antivirus program protects a computer
and the webpage shows the company logo against viruses by

B. The web address starts with https:// A. communicating and passing the infor-
mation to the outsider.
C. You found the address on a search en-
B. identifying and removing any computer
gine or as a link in an email
viruses found on storage media, in the
D. Company contact details computer memory or incoming email files.

39. This is when someone acts as someone C. installing a new virus through the data
else to by items or get credit. received.
D. reading the operating system and mod-
A. hacking
ifies it.
B. identity theft
44. Which of the following is true about the In-
C. cybercrime
ternet of Things? I. The Internet of Things
D. software piracy is the network of devices with the ability

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.1 PROTECTION AND SECURITY 290

to connect and exchange data.II. The Inter- C. Someone monitors data travelling on
net of Things increases our vulnerability to the network to steal information.
cyber attacks.III. The Internet of Things is D. none of above
purely positive-there are no negative con-
sequences to increased connectivity 49. Which of the following is not true about
A. I only cyber security?

B. I and II A. Recent data breaches have released


personal information of hundreds of mil-

NARAYAN CHANGDER
C. I and III lions of people.
D. None of the above B. Cyber security is the protection of com-
puter systems, networks, and data from
45. The law regarding holding personal data
digital attacks.
states that if a company holds personal
data it must: C. As we rely more on computing devices
to store and send data, we increase our
A. keep the data secure
vulnerability to cyber attacks.
B. keep the data accurate and up to date
D. Cyber attacks can devastate large or-
C. allow people to see what data is held ganizations, but individuals are largely un-
about them affected.
D. all of the above
50. You accidentally delete a program file from
46. Which of the following is a sign of a possi- your computer. Now it will not boot up.
ble malware attack? What kind of computer threat is this?
A. A new toolbar appears on your A. Spoofing
browser B. Phishing
B. You see a lot of pop-up adverts even C. Human error
when you’re offline
D. Software piracy
C. Your hard disk is working overtime but
you’re not doing anything 51. Which of the following Computer Science
Fields are covered by Cyber Security?
D. Any of these
A. Machine Learning
47. What does patent protect?
B. Computer Networking
A. Inventions
C. Cryptography
B. Buildings
D. Data Science
C. Computer
E. Web Development
D. Groceries
52. Under the Computer Misuse Act, it is ille-
48. Which of these best describes an active at- gal to:
tack? A. look at someone else’s computer files
A. Someone attacks a network with mal- without permission
ware. B. look at someone else’s computer files
B. Someone from inside an organisation without permission with intent to commit
uses the network to steal information. further criminal offences

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.1 PROTECTION AND SECURITY 291

C. change data on someone else’s com- 57. If someone asks for your account informa-
puter files without permission tion, what should you do?

PRACTICE BOOK» NOT FOR SALE


D. all of the these A. Give it to them.
B. Exchange it for money.
53. What is social engineering?
C. Don’t give it to them.
A. Methods used by cybercriminals to de-
D. none of above
ceive individuals into handing over infor-
mation 58. which is NOT a measure for protection
B. Hacking a system by taking control of from natural threats?
someone else’s computer A. back up data
C. Using the computer of someone who B. install protective electrical devices
has accidently left themselves logged on C. maintain proper temperature
D. A malicious attempt to disrupt a server D. save before shutting down
or network by flooding it with internet traf-
fic 59. A sudden increase in line voltage, which
may lead to the damage of electronic de-
54. To avoid your computer being infected by vices, such as computers.
malware, you should not: A. online predator
A. Download music or software from ille- B. firewall
gal sites C. hacking
B. open emails from people you don’t D. power surge
know
60. To reduce the danger of eyestrain from us-
C. open email attachments
ing a computer:
D. post personal details on social net- A. the room should be well-lit, not too
working sites bright and not too dim
55. A data recovery program can: B. the light should not reflect off your
computer screen
A. recover files that you have deleted
from your hard drive C. you should take regular breaks
D. all of these
B. recover files even if you have reformat-
ted your hard drive 61. What is the purpose of the Data Protection
C. recover emails that you have sent Act?

D. all of these A. To protect an organisation from hack-


ers
56. How to protect a process of manufactur- B. To require organisations that store
ing? data on people to use it responsibility and
A. Using trade secret keep it safe
C. To act as a deterrent to cybercriminals
B. Using copyright
who try to steal data on people
C. Using patent
D. To prevent cybercriminals from
D. none of above spreading a virus

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.1 PROTECTION AND SECURITY 292

62. Which of these is a sign of malware on 67. If someone suspects that a company holds
your computer? inaccurate information about them:
A. You receive a fraudulent email A. they have a right to see what data the
B. Your browser alerts you it has blocked company holds about them
a pop-up window B. they can log on any time to find out
C. Your homepage has changed unexpect- what data is held about them
edly C. they can correct the data themselves

NARAYAN CHANGDER
D. Your browser alerts you to update to a D. they will be unable to get the data cor-
newer version rected
63. You are using google chrome and you want 68. Identify the method and example to over-
to browse a website but not have the web- come the following security risk.Dharma
site stored in your browsing history.what wants to save his documents file in sev-
should you do? eral place to avoid data loss.
A. log in to someone else to browse the A. Turn on firewall, Avira
site
B. Use data backup, Acronis Trueimage
B. configure independent browsing backup 2
C. use inprivate C. Install antivirus, Zone Alarm Profire-
D. Use incognito wall
D. Install antispyware, SuperAntiSpy-
64. Which of the following is a “strong” pass-
ware
word for someone named Justin Smith?
A. JustinSmith 69. Which of the following passwords would
B. Justin123456 be the best defence against a brute force
attack?
C. softcatsears
A. peter1£@!
D. SmithJ1
B. Petertherabbit
65. ‘Gaining unauthorised access to or control C. P3tertherabb1t
of a computer system’ is a definition of
which type of cybercrime? D. P$tertherabb1t
A. Hacking 70. an instant message can have attachments
B. Viruses that
C. Social engineering A. are meant for malicious purposes
D. Phishing B. are cute pictures
C. that install software updates
66. This means to gain access without permis-
sion, unauthorized access. D. that have all the answers to life
A. hacking 71. Which UK law gives you the right to access
B. cybercrime the data an organisation stores on you?
C. identity theft A. The Freedom of Information Act
D. virus B. The Computer Misuse Act

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.1 PROTECTION AND SECURITY 293

C. The Data Protection Act C. can only be transmitted via email


D. The Copyright, Designs, and Patents D. cannot be removed from your com-

PRACTICE BOOK» NOT FOR SALE


Act puter

72. Name the elements or goals of information 77. You receive an email from an unknown
security. (CLO1, C1) sender asking for money. The sender
A. Vulnerability, integrity and availability wants you to respond to the email. There
are no hyperlinks in the email, but it in-
B. Confidentiality, integrity and availabil- cludes unusual use of English and there are
ity a number of spelling mistakes. What type
C. Confidentiality, usability and integrity of social engineering attempt is this?
D. Reliability, integrity and accountability A. Shouldering
73. An individual who develops contact with B. Phishing
Internet users, through chat rooms, online C. Spam
forums, or e-mail, to exploit them finan-
D. Blagging
cially or involve them in dangerous rela-
tionships. 78. Some aspects of protection of the security
A. encryptor of computers are
B. online predator A. Protecting your family
C. firewall B. Protecting users of programs
D. computer security C. Protecting code and data
D. Protecting your belongings
74. Which works are protected by copyright?
A. ideas 79. Theft, unauthorized access and sabotage
are examples of this.
B. all works
A. software piracy
C. literary, musical, dramatic, pictorial
works B. cyberstalking
D. titles, names, slogans C. online auction fraud
D. computer crimes
75. Keeping a user’s data, including personal
files and e-mail messages, such that the 80. This is unauthorized copying of a soft-
data is not accessible by anyone without ware.
appropriate permission
A. biometric protected
A. encryption
B. worm
B. copyright
C. hacking
C. computer privacy
D. software piracy
D. hacker
81. A processing or communication service
76. A computer virus is a small program which: that enhances the security of the data pro-
A. will destroy your computer hardware cessing systems and the information trans-
B. you may unintentionally transmit to fers of an organization.
other computers and infect them A. Security Attack

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.1 PROTECTION AND SECURITY 294

B. Security Mechanism 86. Gaining unauthorised access to someone


C. Security Algorithm else’s computer files is known as:

D. Security service A. copyright infringement

82. Which of these best describes a passive at- B. hacking


tack? C. virus attack
A. Someone attacks a network with mal- D. data theft
ware.

NARAYAN CHANGDER
B. Someone from inside an organisation 87. Which of these passwords is the most se-
uses the network to steal information. cure?
C. Someone monitors data travelling on A. MyFav0ur1t3P3t1saC@t
the network to steal information.
B. ABCD1234
D. none of above
C. Password
83. Health and Safety regulations require an
D. 123456789
employer to:
A. provide cup holders 88. There are several reasons why a company
B. provide flat screens would develop and implement a business
continuity plan. Which of the following
C. provide tiltable screens to change the
properly describes the best reason?
angle and height of view
D. all of the above A. To increase liability
B. The continuation of a company
84. The process of converting data into an un-
readable and unusable form. Encryption C. Compliancy with regulations
is done to prevent unauthorized access of
D. Properly react to disasters
data, especially during data transmission
over the Internet.
89. Computer security incidents are catego-
A. encryption rized into levels.
B. decryption A. two
C. cookie
B. three
D. backup
C. four
85. You receive an e-mail message. The sender D. five
of the message claims to be a bank execu-
tive and wants your personal information 90. When disposing of an old computer:
to open an account for you. Which one
of the following terms describes this activ- A. It should be incinerated to ensure that
ity? sensitive data is destroyed
A. Phishing B. It should be taken to a recycling center
B. Pirating C. It should be taken to a landfill site
C. Spyware D. It should be taken apart and the outer
D. Hacking casing recycled, the rest put in the bin

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.1 PROTECTION AND SECURITY 295

91. A small file on a computer that is created B. Someone tries to get information by
when a user visits a Web site. A Web site cracking password through trial and er-
uses cookies to identify users who visit ror.

PRACTICE BOOK» NOT FOR SALE


the site, and also track the preferences of C. Someone from inside an organisation
the users. tries to steal information.
A. cache memory D. none of above
B. active content
96. Which kind of personal information do peo-
C. firewall ple send over the Internet?
D. cookie A. Credit Card Numbers
92. When you enter personal details on social B. Contact Information
networking sites you should never: C. Medical Information
A. enter personal details of your friends D. All of above
B. upload photographs of yourself that 97. How often will your bank request a confir-
you would not want everyone to see mation of your password or account num-
C. enter your address ber via email?
D. enter any of these A. Once a year
B. Once every month
93. Your computer does not work when it
heats up. What is affecting your computer C. Never
in this case? D. Whenever there is an upgrade in their
A. Environment surrounding your com- system
puter 98. “Malware” is:
B. Hackers trying to access your com- A. a type of virus
puter
B. unwanted software installed without
C. Firewall installed in your computer consent that might monitor key presses
D. Many programs opened simultane- C. security software to detect viruses
ously
D. a software bug
94. You spilled a drink on your computer. 99. means that a sender must not be able
What kind of threat is this? to deny sending a message that he sent.
A. Natural disaster A. confidentiality
B. Human error B. integrity
C. Environmental threat C. authentication
D. Hacking D. Non repudiation
95. Which of these best describes a brute force 100. An irrelevant and unsolicited e-mail mes-
attack? sage sent by an unknown sender. A spam
A. A hacker tries to stop people from ac- is sent to distribute a message to many re-
cessing a network by flooding it with traf- cipients at one time
fic. A. spam

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.1 PROTECTION AND SECURITY 296

B. software piracy 106. The name by which a user is identified


C. slander to a computer system or network. To ac-
cess a computer protected by username
D. secure sockets layer (SSL) and password, a user needs to enter the
correct combination of username and pass-
101. What is the importance of Digital Safety
word.
and Security?
A. To avoid information leakage A. Trojan horse

NARAYAN CHANGDER
B. To give your password to strangers B. user name
C. To know how to make a lockscreen C. password
D. To hack other people’s accounts D. spam
102. Which of the following is not a computer
107. A computer program that is installed on
security incident?
your computer without your knowledge.
A. web site defacement Spyware can secretly send out informa-
B. social engineering incidents tion about your Web browsing habits or
other personal details to another computer
C. car theft
through the network.
D. virus attacks
A. phishing
103. A company that provides Internet connec- B. slander
tivity to individuals, businesses, and orga-
nizations. C. spyware
A. cookie D. software piracy
B. hacker
108. You receive a desperate plea for help
C. Internet Service Provider (ISP)
from a friend who says they are stuck
D. world wide web overseas and all their money has been
stolen. You should:
104. Which of the following is considered a
low-level incident? A. reply to the email
A. Unfriendly employment termination B. delete the email
B. Illegal access to buildings C. send some money
C. denial of service attacks D. forward the email to a mutual friend
D. Unsuccessful scans and probes
109. A loss of is the disruption of access
105. what additional measures can be taken to to or use of information or an information
protect your computer from physical dam- system.
age?
A. Availability
A. put computer in your car
B. keep it in your bookbag B. Integrity

C. never share with friends C. Authentication


D. turning off computer during a storm D. Non repudiation

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.1 PROTECTION AND SECURITY 297

110. Which of the following attacks is con- C. Security Triad


ducted by posing as a legitimate entity in D. none of the above
order to solicit sensitive information from

PRACTICE BOOK» NOT FOR SALE


users? 115. You should only chat online with
A. Hacking A. Friends
B. Shoulder Surfing B. family
C. Insider C. classmates
D. Phishing D. all of the above

111. You can tell whether a link in email will 116. type of malicious software program (mal-
take you to a genuine website, for exam- ware) that, when executed, replicates by
ple belonging to a bank, without risk, by: reproducing itself (copying its own source
code) or infecting other computer pro-
A. pointing to the link or hovering over it
grams by modifying them.
without clicking
A. Computer Virus
B. deleting the email
B. Computer Worm
C. replying to the email
C. MyDoom
D. clicking on the link
D. Malicious Code
112. Identify the method and example to over-
come the following security risk.Teng Looi 117. A loss of is the unauthorized modifi-
wants to protect her assignment that she cation or destruction of information.
keeps in her computer folder. A. confidentiality
A. Install firewall, Bull Guard Anti Virus B. Integrity
B. Using data backup, Acronis Trueimage C. Authentication
backup 2 D. Non repudiation
C. Install Antivirus, Kaspersky antivirus
118. Phishing is a way of attempting to ac-
D. Using cryptography, Securstore quire information. What information does
it try to acquire? Select two
113. Message means that the receiver is
ensured that the message is coming from A. User names and passwords
the intended sender, not an imposter. B. Level of education
A. confidentiality C. Credit card details
B. integrity D. Marital status
C. authentication
119. The practice of taking someone else’s
D. none of the above work or ideas and passing them off as
one’s own.
114. Confidentiality, Integrity, and Availabil-
ity are the three main things used to eval- A. Citation
uate information security. B. Bibliography
A. CIA Triad C. Plagiarism
B. Baiting D. Newton’s Law

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.1 PROTECTION AND SECURITY 298

120. Due to a recent string of thefts in your 125. What is a hacker?


office, you need to harden your local sys- A. A person who tries to illegally access
tem.what action are most appropriate for your computer
your situation?
B. someone who uses a saw
A. Install a hardware lock
C. a person who works in the forest
B. disable unused services
D. someone who de-bugs computers
C. install antimalware

NARAYAN CHANGDER
D. buy a new computer 126. The act or instance of making a duplicate
copy of a program, a disk, or data. The
121. A method of protecting the rights of an duplicate copy is called a backup.
originator of a creative work, such as text, A. cache memory
piece of music, painting, or computer pro-
B. backup
gram, through law.
C. copyright
A. copyright
D. encryption
B. encryption
C. computer privacy 127. Select all the bad examples of practicing
Digital Safety and Security.
D. decryption
A. Sharing an account with your boyfriend
122. Which of the following is a method of ver- / girlfriend.
ifying that a login attempt has been made
B. Keeping all your devices secured with
by the account owner?
a password.
A. CAPTCHA
C. Adding your location to a public post in
B. Two-factor authentication Facebook.
C. Installing a firewall D. Talking to someone you’ve never met
D. Setting user permission personally about your day.

123. Why security of computers need to be 128. Which of the following functions is not
protected? part of incident handling?
A. design
A. To protect computer system against
criminals B. report
B. To expose individual private data C. analysis
C. To protect individual private data D. response
D. To allow virus to attack computer 129. When choosing a password you should:
124. If you find someone trying to hack into a A. use something easy to remember like
secure system, what should you do? your pet’s name
A. Join in. B. use a combination of special char-
acters, letters and numbers that mean
B. Blackmail him/her. something to you but no one else
C. Tell them the better way of doing it. C. save all your passwords in a file on
D. Report it. your computer in case you forget one

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.1 PROTECTION AND SECURITY 299

D. use a foreign word that will not be in 135. You want a new computer. What can you
an English dictionary do to prevent others from accessing your
confidential data in this computer?

PRACTICE BOOK» NOT FOR SALE


130. means hidden writing, the practice of
using to conceal text. A. Set a user name and password
A. Antivirus B. Use an uninterruptible power supply
(UPS) and a surge protector
B. Data Backup
C. Back up data and save it in a different
C. Anti Spyware
location
D. Cryptography
D. Install a spyware program and an an-
131. The process of reconverting the en- tivirus program
crypted data into a readable and usable
form. 136. A phishing email is one which:
A. copyright A. requests a payment for goods you
have not received
B. firewall
C. decryption B. offers you products in which you may
have no interest
D. computer security
C. encourages you to click on a link to a
132. is the protection of computer systems fraudulent website
from theft or damage to their hardware,
D. contains abusive and threatening lan-
software or electronic data, as well as
guage
from disruption or misdirection of the ser-
vices they provide. 137. A filter that blocks unreliable and unau-
A. Computer security thorized information from the Internet be-
fore it reaches your computer or a private
B. Network security
network. It provides additional protec-
C. Cyber Forensics tion against threats such as hackers and
D. Network Forensics viruses. A firewall also helps to ensure
computer privacy by restricting external
133. Employers who ignore Health and Safety access by any unauthorized user.
rules regarding computer use may:
A. cookie
A. at worst, have to pay a fine
B. active content
B. at worst, face a prison sentence
C. firewall
C. have their company closed down
D. encryption
D. have their computer equipment confis-
cated 138. A password is a service that stores
134. What is copyright? all of your account information securely.

A. a form of protection A. Vault


B. an image B. manager
C. a form of protection for kids C. binder
D. copies of work D. collection

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.1 PROTECTION AND SECURITY 300

139. Which of the following are types of mal- 143. Most programs also protects against
ware? Tick all that apply. worms and Trojan horses.
A. Trojans A. firewall
B. Worms B. antivirus
C. Anti-virus C. antispyware
D. Firewall D. data backup
E. Ransomware
144. Verbal defamation. This is a punishable

NARAYAN CHANGDER
140. Which of the following data is considered offense.
to be “personal data” when held by a A. firewall
school:
B. encrypt
A. the school’s email address the number
of pupils in the school C. slander
B. the year that a particular pupil joined D. libel
the school 145. Alice is buying books from an online re-
C. the average percentage a*-c grades tail site, and she finds that she is able to
at gcse gained by pupils last year change the price of a book from $19.99
D. none of above to $1.99.Which part of the CIA triad has
been broken?
141. What is digital security?
A. Confidentiality
A. Is something that exploits a weakness
in an asset. B. Integrity

B. Is a process of identifying potential C. Availability


risks, Vulnerabilities and threats, then cre- D. none of above
ating countermeasures to respond to po-
tential threats 146. RSI (Repetitive Strain Injury) can be
caused by:
C. Digital security is the protection of
computer systems and data from unautho- A. moving heavy computers about fre-
rised use or harm. quently
D. Is anything that has potential harm or B. using a computer in almost all of your
damage to an asset or life. lessons
C. using a keyboard for several hours a
142. Which of these best describes a denial of
day over and over again
service attack?
D. sitting in the same position for too long
A. A hacker tries to stop people from ac-
cessing a network by flooding it with traf- 147. Any information available on the Internet
fic. is an intellectual property, which is legally
B. Someone tries to get information by owned by the person who created it. The
cracking password through trial and er- owner of an intellectual property has the
ror. exclusive rights to control the use of this
C. Someone from inside an organisation information.
tries to steal information. A. hacker
D. none of above B. firewall

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.1 PROTECTION AND SECURITY 301

C. administrator 153. Identify the method and example to over-


D. intellectual property come the following security risk.Moo Hyul
is a network engineer. He wants to con-

PRACTICE BOOK» NOT FOR SALE


148. What does copyright protect? trol the incoming and outgoing network
traffic of his organization.
A. Friends’work
A. Turn on firewall, Zone Alarm ProFire-
B. House chores wall
C. Homework B. Use data backup, Acronis Trueimage
D. Any creative work backup 2
C. Install antivirus, Invisible Secret4
149. What is Copyright Infringement?
D. Install antispyware, Securstore
A. anyone who uses someone work with-
out permission 154. Using locks, firewalls, antivirus, and
B. a copy of someone work backing up data are examples of this.
C. anyone who uses copyright owners A. security safeguards
work with permission B. computer crimes
D. a picture of someone work C. privacy concerns

150. A process (or a device incorporating such D. sabotage


a process) that is designed to detect, pre-
155. Who Owns the Copyright in a Work?
vent, or recover from a security attack.
A. you and family members
A. Security Attack
B. author who created it
B. Security Mechanism
C. the president
C. Security Algorithm
D. the government
D. Security service
156. Unauthorized copying of copyrighted
151. You cannot access a file in a computer software without obtaining the license or
that belongs to your friend. What pre- permission of its copyright owner.
vents you from accessing the file?
A. secure sockets layer (SSL)
A. Spyware
B. software piracy
B. Firewall
C. slander
C. Antivirus
D. libel
D. Uninterruptable Power Supply (UPS)
157. You can be confident your passwords are
152. Message means that the data must completely secure if:
arrive at the receiver exactly as sent.
A. they are at least 8 characters long
A. confidentiality
B. you change them regularly
B. integrity
C. you use different passwords for all
C. authentication your online accounts
D. none of the above D. All of these

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.1 PROTECTION AND SECURITY 302

158. A computer program that propagates it- C. Their loyalty card number
self across computers, usually by creating
D. All of these
copies of itself in each computer’s memory.
A worm might duplicate itself in one com-
puter so often that it causes the computer 163. Which of the following describes a name
to crash. generator attack?

A. worm A. Software used to randomly create ac-


counts that post to social media
B. snake

NARAYAN CHANGDER
C. Trojan horse B. Attackers create an online quiz to pro-
duce a name; the answers to the quiz
D. virus find out key pieces of information that can
159. Is an attempt to make a computer or net- help them to answer the security ques-
work resource unavailable to its intended tions protecting people’s accounts
users. C. An attack that makes multiple at-
A. Masquerading tempts to guess a username and pass-
B. Replay word

C. Message Modification D. A form of identity theft conducted on-


line
D. Denial of Service

160. Which one of the following UK laws 164. A log book is useful in:
would a DDoS attack violate?
A. preventing an incident.
A. The Freedom of Information Act
B. handling an incident.
B. The Computer Misuse Act
C. developing a contingency plan.
C. The Data Protection Act
D. The Copyright, Designs, and Patents D. All of the answers are correct.
Act
165. Hacking is illegal under:
161. Organisations holding personal data are
allowed to: A. The Data Protection Act
A. sell the data to other organisations B. The Computer Misuse Act
B. keep the data for ever C. Copyright Law
C. sell the data for research purposes af- D. Health and Safety Law
ter removing data from which individuals
can be identified
166. The act of copying someone’s work and
D. none of the above using it as if it is your own work, without
mentioning the source.
162. Which of the following is “personal data”
which may be held about someone on the A. plagiarism
computer system of a supermarket?
B. computer safety
A. Their address
C. phishing
B. The amount they spent last year at the
supermarket D. hacking

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.1 PROTECTION AND SECURITY 303

167. What is the definition of a computer C. excessive heat


virus? D. fire

PRACTICE BOOK» NOT FOR SALE


A. Malicious software that self-replicates
172. What is a component that a power surge
B. Malicious software that disguises it-
can DESTROY?
self as something else
A. screen
C. Malicious software that uses network
bandwidth to deliberately disrupt the B. printer
speed of the network C. motherboard
D. Malicious software that monitors ev- D. video card
ery keystroke the user makes
173. A person who uses computer expertise
168. What is trade secret? to gain unauthorized access to a computer,
A. Unimportant information and then misuses or tampers the programs
and data stored on the computer.
B. Business information in a company
A. hacker
C. Wrong information which is danger-
ous for a company B. encrypt
D. Information that give company advan- C. firewall
tage over others D. programmer
169. Hackers: 174. Define computer security measure
A. will destroy your computer hardware A. Security measures is the action that
B. are rarely able to steal personal data could cause a loss or damage to computer
C. sometimes steal passwords so they hardware and software
can access your online account B. Security measure is code of accept-
D. can only steal one password at a time able behaviours users should follow while
in the Internet
170. Your manager just got a new workstation C. Security measures is the protections
and is not part of a domain.he wants to that can reduce the risk of a problem oc-
know which user account he should disable curing due to the computer security risk
to increase security. what should you telll
him? D. Security measures is the use of com-
puter network, file or other resources
A. Guest without permission
B. users
175. What is the term for people who are
C. power users paid to legally hack into computer systems
D. administrator with the sole purpose of helping a company
identify weaknesses in their system?
171. Which of the following is NOT considered
A. Ethical hackers
a natural disaster that can affect computer
systems? B. Legal hackers
A. flood C. Penetration testers (pen testers)
B. falling water D. System administrators

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


12.1 PROTECTION AND SECURITY 304

176. You can protect yourself against spam or A. once a week


fraudulent emails by:
B. once a day
A. using a spam filter
C. once a month
B. never clicking on links that you are sus-
picious of D. on a regular schedule
C. being aware of different types of fraud- 179. A well-designed workstation:
ulent email
A. has an adjustable chair which supports

NARAYAN CHANGDER
D. all of these
the lower back
177. You have just landed at the airport and B. has the screen above eye level
have an unexpected six-hour layover. you
want to use your smartphone to get some C. has at least 10m of space per person
work done.what should you disable as a D. all of the above
precautionary device hardening measure
to help prevent potential attacks? 180. Software that checks incoming and outgo-
A. autofill ing traffic on a network to check for mali-
cious code is known as what?
B. Bluetooth
A. Anti-virus
C. polo
D. FFC B. Anti-malware
C. Firewall
178. How often should you back up your
data? D. Two-factor authentication

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS

You might also like